INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aefc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a538c r4:857a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a538c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:2:94 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:94 tgid:94 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:83376c00 r4:83376c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83376c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a478c r4:857a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a478c r4:833a6600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83376c00 r8:833a662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833a6600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833a6600 r8:8027ed34 r7:df879e60 r6:833a6680 r5:83376c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833cdd00 INFO: task kworker/1:2:94 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:2:3109 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3109 tgid:3109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83933000 r4:83933000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83933000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b854c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83933000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc41000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495df8c r4:8495dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495df8c r4:848bd400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83933000 r8:848bd42c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd400 r8:8027ed34 r7:ec311e60 r6:848bd580 r5:83933000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845ab100 INFO: task kworker/0:2:3109 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:4:3110 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ec435d84 r8:00000002 r7:60000113 r6:ec435d8c r5:838a2400 r4:838a2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838a2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec435e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d78c r4:8495d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d78c r4:848bd500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a2400 r8:848bd52c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd500 r8:8027ed34 r7:df9c1e60 r6:848bd480 r5:838a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec435fb0 to 0xec435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846e0040 INFO: task kworker/0:4:3110 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:3:3112 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3112 tgid:3112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b5d84 r8:00000002 r7:60000113 r6:df9b5d8c r5:8324bc00 r4:8324bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a4b8c r4:857a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4b8c r4:846bfa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324bc00 r8:846bfa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bfa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bfa00 r8:8027ed34 r7:df879e60 r6:848bd380 r5:8324bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8465b0c0 INFO: task kworker/1:3:3112 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:5:3114 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b10000 r4:83b10000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b10000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b10000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424738c r4:84247000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8424738c r4:848bd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b10000 r8:848bd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd300 r8:8027ed34 r7:df9c1e60 r6:848bd700 r5:83b10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848789c0 INFO: task kworker/0:5:3114 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:6:3116 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83b16000 r4:83b16000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b16000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b16000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cb8c r4:84b2c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2cb8c r4:848bd680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b16000 r8:848bd6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd680 r8:8027ed34 r7:df9c5e60 r6:848bd600 r5:83b16000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8469abc0 INFO: task kworker/0:6:3116 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:7:3118 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:844b8000 r4:844b8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510138c r4:85101000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510138c r4:848bd780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b8000 r8:848bd7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd780 r8:8027ed34 r7:df9d5e60 r6:846bf080 r5:844b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6000 INFO: task kworker/0:7:3118 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:8:3121 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83370000 r4:83370000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83370000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83370000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2f38c r4:84b2f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2f38c r4:848bd800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83370000 r8:848bd82c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd800 r8:8027ed34 r7:df9ede60 r6:846bf900 r5:83370000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6180 INFO: task kworker/0:8:3121 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:9:3123 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83376000 r4:83376000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83376000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83376000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df991000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85036b8c r4:85036800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85036b8c r4:848bd880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83376000 r8:848bd8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd880 r8:8027ed34 r7:df9ede60 r6:846bfa80 r5:83376000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3124 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:83380000 r4:83380000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83380000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83380000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d178c r4:848bd900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83380000 r8:848bd92c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd900 r8:8027ed34 r7:df9ede60 r6:846bf580 r5:83380000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:10:3124 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3125 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83382400 r4:83382400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83382400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ffd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83382400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85103f8c r4:85103c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85103f8c r4:848bd980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83382400 r8:848bd9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd980 r8:8027ed34 r7:dfa15e60 r6:846bf280 r5:83382400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:11:3125 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3128 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8325a400 r4:8325a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85216a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84928b8c r4:84928800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84928b8c r4:848bda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:848bda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bda00 r8:8027ed34 r7:dfa15e60 r6:846bfb80 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6580 INFO: task kworker/0:12:3128 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3130 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:8438bc00 r4:8438bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344b8c r4:85344800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85344b8c r4:848bda80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438bc00 r8:848bdaac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bda80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bda80 r8:8027ed34 r7:dfa15e60 r6:846bfb00 r5:8438bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6800 INFO: task kworker/0:13:3130 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3131 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:8438c800 r4:8438c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84929b8c r4:84929800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84929b8c r4:848bdb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438c800 r8:848bdb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdb00 r8:8027ed34 r7:dfa45e60 r6:846bfc00 r5:8438c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6800 INFO: task kworker/0:14:3131 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:84388000 r4:84388000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84388000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84388000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2f8c r4:852d2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2f8c r4:848bdb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84388000 r8:848bdbac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdb80 r8:8027ed34 r7:dfa49e60 r6:846bf380 r5:84388000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6c00 INFO: task kworker/0:15:3133 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3135 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8438d400 r4:8438d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0705000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85495b8c r4:85495800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85495b8c r4:848bdc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438d400 r8:848bdc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdc00 r8:8027ed34 r7:dfa49e60 r6:846bf480 r5:8438d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6bc0 INFO: task kworker/0:16:3135 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bbd02000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3138 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8338bc00 r4:8338bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84922b8c r4:84922800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84922b8c r4:848bdc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338bc00 r8:848bdcac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdc80 r8:8027ed34 r7:dfa65e60 r6:846bfd00 r5:8338bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6cc0 INFO: task kworker/0:17:3138 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bbd02000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:8338b000 r4:8338b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b938c r4:854b9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854b938c r4:848bdd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338b000 r8:848bdd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdd00 r8:8027ed34 r7:dfa75e60 r6:846bfd80 r5:8338b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6fc0 INFO: task kworker/0:18:3139 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc041000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3141 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:8438e000 r4:8438e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c478c r4:854c4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c478c r4:848bdd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438e000 r8:848bddac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdd80 r8:8027ed34 r7:dfa75e60 r6:848bde00 r5:8438e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848e8180 INFO: task kworker/0:19:3141 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc279000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3145 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b03000 r4:83b03000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b03000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b03000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b44b8c r4:84b44800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b44b8c r4:848bde80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b03000 r8:848bdeac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bde80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bde80 r8:8027ed34 r7:dfa75e60 r6:848bdf00 r5:83b03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf280 INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc480000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:840ec800 r4:840ec800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ec800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84923b8c r4:84923800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84923b8c r4:848bdf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ec800 r8:848bdfac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdf80 r8:8027ed34 r7:df9dde60 r6:830cd780 r5:840ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf280 INFO: task kworker/0:21:3146 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc889000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3149 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:840e9800 r4:840e9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492b78c r4:8492b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492b78c r4:830cd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e9800 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ed34 r7:df9e9e60 r6:830cd280 r5:840e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf300 INFO: task kworker/0:22:3149 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc889000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:840eec00 r4:840eec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840eec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852003c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85207b8c r4:85207800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85207b8c r4:848f2000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840eec00 r8:848f202c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2000 r8:8027ed34 r7:dfa91e60 r6:848f2080 r5:840eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf440 INFO: task kworker/0:23:3150 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc8b5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3151 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:840e8000 r4:840e8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492bb8c r4:8492b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492bb8c r4:848f2100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8000 r8:848f212c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2100 r8:8027ed34 r7:dfaa5e60 r6:848f2180 r5:840e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf440 INFO: task kworker/0:24:3151 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bccb8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:840ed400 r4:840ed400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ed400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85770b8c r4:85770800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85770b8c r4:848f2200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ed400 r8:848f222c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2200 r8:8027ed34 r7:dfaa5e60 r6:848f2280 r5:840ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf680 INFO: task kworker/0:25:3155 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd120000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3156 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:840ee000 r4:840ee000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ee000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ae440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec403000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d8f8c r4:856d8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d8f8c r4:848f2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ee000 r8:848f232c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2300 r8:8027ed34 r7:dfab1e60 r6:848f2380 r5:840ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf680 INFO: task kworker/0:26:3156 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd38e000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3158 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:84116000 r4:84116000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84116000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583cdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84116000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856da78c r4:856da400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856da78c r4:848f2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84116000 r8:848f242c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2400 r8:8027ed34 r7:dfac5e60 r6:848f2480 r5:84116000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfd40 INFO: task kworker/0:27:3158 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd8a8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3161 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:84116c00 r4:84116c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84116c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857adc80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d9b8c r4:856d9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d9b8c r4:848f2500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84116c00 r8:848f252c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2500 r8:8027ed34 r7:dfacde60 r6:848f2580 r5:84116c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfbc0 INFO: task kworker/0:28:3161 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd8a8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3162 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84718000 r4:84718000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84718000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84718000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f438c r4:848f4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f438c r4:848f2600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84718000 r8:848f262c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2600 r8:8027ed34 r7:dfacde60 r6:848f2680 r5:84718000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfd80 INFO: task kworker/0:29:3162 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdbab000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3164 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84718c00 r4:84718c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84718c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84718c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85866b8c r4:85866800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85866b8c r4:848f2700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84718c00 r8:848f272c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2700 r8:8027ed34 r7:dfab9e60 r6:848f2780 r5:84718c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfe80 INFO: task kworker/0:30:3164 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdf5b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3165 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84719800 r4:84719800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84719800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84719800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492e38c r4:8492e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492e38c r4:848f2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84719800 r8:848f28ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2880 r8:8027ed34 r7:dfab9e60 r6:848f2900 r5:84719800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902040 INFO: task kworker/0:31:3165 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdf5b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3168 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:8471a400 r4:8471a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854825c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471a400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f5f8c r4:848f5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f5f8c r4:848f2980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471a400 r8:848f29ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2980 r8:8027ed34 r7:dfb01e60 r6:848f2a00 r5:8471a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902200 INFO: task kworker/0:32:3168 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be1f8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3169 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:8471b000 r4:8471b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471b000 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f6b8c r4:848f6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f6b8c r4:848f2a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471b000 r8:848f2aac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2a80 r8:8027ed34 r7:dfb01e60 r6:848f2b00 r5:8471b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902200 INFO: task kworker/0:33:3169 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be367000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3172 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:8471bc00 r4:8471bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484b8c r4:85484800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85484b8c r4:848f2b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471bc00 r8:848f2bac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2b80 r8:8027ed34 r7:dfb01e60 r6:848f2c00 r5:8471bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849026c0 INFO: task kworker/0:34:3172 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be747000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3174 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:8471c800 r4:8471c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485b8c r4:85485800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85485b8c r4:848f2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471c800 r8:848f2cac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2c80 r8:8027ed34 r7:dfb0de60 r6:848f2d00 r5:8471c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902640 INFO: task kworker/0:35:3174 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be747000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3176 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:840f6000 r4:840f6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85548b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492ef8c r4:8492ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492ef8c r4:848f2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f6000 r8:848f2dac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2d80 r8:8027ed34 r7:dfb21e60 r6:846bfe80 r5:840f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902800 INFO: task kworker/0:36:3176 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: beccf000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3178 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8338ec00 r4:8338ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856743c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f313000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858adb8c r4:858ad800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858adb8c r4:848f2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338ec00 r8:848f2e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2e00 r8:8027ed34 r7:dfb41e60 r6:846bff00 r5:8338ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902940 INFO: task kworker/0:37:3178 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: befa5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3179 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83388c00 r4:83388c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83388c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e69c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83388c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d38c r4:8592d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592d38c r4:848f2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83388c00 r8:848f2eac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2e80 r8:8027ed34 r7:dfb4de60 r6:846bff80 r5:83388c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902940 INFO: task kworker/0:38:3179 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf63c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3184 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:840f4800 r4:840f4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8594178c r4:85941400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8594178c r4:848f2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:848f2f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2f00 r8:8027ed34 r7:dfb4de60 r6:846bfc80 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:39:3184 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf63c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3186 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83b09800 r4:83b09800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b09800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b09800 r7:00000000 r6:83018000 r5:00001000 r4:7f313000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cab8c r4:859ca800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cab8c r4:848f2f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b09800 r8:848f2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2f80 r8:8027ed34 r7:dfb6de60 r6:846bf680 r5:83b09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:40:3186 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf9d5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3187 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:848c8000 r4:848c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd4f8c r4:85cd4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cd4f8c r4:8491c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8000 r8:8491c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8491c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c000 r8:8027ed34 r7:dfb61e60 r6:846bf880 r5:848c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:41:3187 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bfd22000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3190 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb2dd84 r8:00000002 r7:60000013 r6:dfb2dd8c r5:848c8c00 r4:848c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abe40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb821000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a4f8c r4:857a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4f8c r4:846bf780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8c00 r8:846bf7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bf780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bf780 r8:8027ed34 r7:df879e60 r6:846bf800 r5:848c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fe80 INFO: task kworker/1:4:3190 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0060000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:848c9800 r4:848c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb999000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5b8c r4:857a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5b8c r4:846bf700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c9800 r8:846bf72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bf700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bf700 r8:8027ed34 r7:df879e60 r6:84697c80 r5:848c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:5:3192 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0060000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3195 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:848ca400 r4:848ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5f8c r4:857a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5f8c r4:84697f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ca400 r8:84697f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84697f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84697f00 r8:8027ed34 r7:dfb81e60 r6:838c1700 r5:848ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:6:3195 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0532000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3196 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:848cb000 r4:848cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a678c r4:857a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a678c r4:838c1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cb000 r8:838c15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:838c1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838c1580 r8:8027ed34 r7:dfb89e60 r6:84501180 r5:848cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:7:3196 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c099b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3197 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:848cbc00 r4:848cbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a638c r4:857a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a638c r4:84501200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cbc00 r8:8450122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84501200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84501200 r8:8027ed34 r7:dfb95e60 r6:833a6180 r5:848cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:8:3197 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0f48000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3200 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:848cc800 r4:848cc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec317000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a738c r4:857a7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a738c r4:833a6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cc800 r8:833a612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833a6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833a6100 r8:8027ed34 r7:dfb95e60 r6:833a6080 r5:848cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490f180 INFO: task kworker/1:9:3200 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c113b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3202 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:848cd400 r4:848cd400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cd400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6b8c r4:857a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6b8c r4:83390f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cd400 r8:83390f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83390f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83390f00 r8:8027ed34 r7:dfba9e60 r6:83390e80 r5:848cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910100 INFO: task kworker/1:10:3202 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c186a000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3203 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:848ce000 r4:848ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec301000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6f8c r4:857a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6f8c r4:83bb1d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ce000 r8:83bb1dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bb1d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bb1d80 r8:8027ed34 r7:dfba9e60 r6:83bb1d00 r5:848ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910100 INFO: task kworker/1:11:3203 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2335000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3207 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:848cec00 r4:848cec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec321000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a778c r4:857a7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a778c r4:83d6d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cec00 r8:83d6d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83d6d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83d6d980 r8:8027ed34 r7:dfba9e60 r6:8490e000 r5:848cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910300 INFO: task kworker/1:12:3207 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3208 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000013 r6:dfbd1d8c r5:848c0c00 r4:848c0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a7f8c r4:857a7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a7f8c r4:8490e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c0c00 r8:8490e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e080 r8:8027ed34 r7:dfbbde60 r6:8490e100 r5:848c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910440 INFO: task kworker/1:13:3208 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3211 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:848c2400 r4:848c2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a838c r4:857a8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a838c r4:8490e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c2400 r8:8490e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e280 r8:8027ed34 r7:dfbc5e60 r6:8490e300 r5:848c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910540 INFO: task kworker/1:15:3211 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3216 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:840f1800 r4:840f1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a878c r4:857a8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a878c r4:8490e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f1800 r8:8490e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e380 r8:8027ed34 r7:dfbc5e60 r6:8491c180 r5:840f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910a00 INFO: task kworker/1:16:3216 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2b17000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3217 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc09d84 r8:00000002 r7:60000013 r6:dfc09d8c r5:84770000 r4:84770000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84770000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84770000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8b8c r4:857a8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a8b8c r4:8490e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84770000 r8:8490e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e400 r8:8027ed34 r7:dfbc5e60 r6:8491c200 r5:84770000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910a00 INFO: task kworker/1:17:3217 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3057000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3219 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84771800 r4:84771800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84771800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84771800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8f8c r4:857a8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a8f8c r4:8490e480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84771800 r8:8490e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e480 r8:8027ed34 r7:dfbc5e60 r6:8491c280 r5:84771800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910e00 INFO: task kworker/1:18:3219 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c323b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3471 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3471 tgid:3471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff59d84 r8:00000002 r7:60000013 r6:dff59d8c r5:84a7bc00 r4:84a7bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a7bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495e78c r4:8495e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495e78c r4:84aa7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a7bc00 r8:84aa7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7f00 r8:8027ed34 r7:dfef1e60 r6:84a57580 r5:84a7bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a959c0 INFO: task kworker/0:76:3471 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c35bc000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3501 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:847e3000 r4:847e3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 INFO: task kworker/0:78:3501 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c35bc000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:129:3517 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:129 state:D stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc5d84 r8:00000002 r7:60000113 r6:dffc5d8c r5:847a0c00 r4:847a0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb78c r4:84adb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb78c r4:84a92680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a0c00 r8:84a926ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92680 r8:8027ed34 r7:dffc1e60 r6:84a44380 r5:847a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc5fb0 to 0xdffc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac100 INFO: task kworker/1:129:3517 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3d0f000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:130:3519 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:130 state:D stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000013 r6:dffc9d8c r5:847a2400 r4:847a2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 INFO: task kworker/1:130:3519 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3d0f000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3521 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3521 tgid:3521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffbdd84 r8:00000002 r7:60000113 r6:dffbdd8c r5:847a3000 r4:847a3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495db8c r4:8495d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495db8c r4:84a44480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a3000 r8:84a444ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44480 r8:8027ed34 r7:dff59e60 r6:84a44500 r5:847a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9cf00 INFO: task kworker/0:79:3521 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3f3c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3523 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3523 tgid:3523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:dffb5d84 r8:00000002 r7:60000113 r6:dffb5d8c r5:84a88000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adbf8c r4:84adbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adbf8c r4:84a92800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88000 r8:84a9282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92800 r8:8027ed34 r7:dffc5e60 r6:84a92880 r5:84a88000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb5fb0 to 0xdffb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac400 INFO: task kworker/1:131:3523 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c426d000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfdff000 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:132 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffcdd84 r8:00000002 r7:60000113 r6:dffcdd8c r5:84a89800 r4:84a89800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a89800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffcde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adbb8c r4:84adb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adbb8c r4:84a92900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a89800 r8:84a9292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92900 r8:8027ed34 r7:dffb5e60 r6:84a92980 r5:84a89800 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:3527 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3527 tgid:3527 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a8a400 r8:84a92a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3528 blocked for more than 452 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a92b00 r8:8027ed34 r7:dffd1e60 r6:84a92b80 r5:84a8b000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac8c0 INFO: task kworker/1:134:3528 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c4ef0000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:3529 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:3529 tgid:3529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000013 r6:dffd9d8c r5:84a8c800 r4:84a8c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aacc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae078c r4:84ae0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae078c r4:84a92c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8c800 r8:84a92c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92c00 r8:8027ed34 r7:dffd1e60 r6:84a92c80 r5:84a8c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:136:3533 blocked for more than 453 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ae0f8c r4:84ae0c00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aacc80 INFO: task kworker/1:136:3533 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c571d000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:dff25d84 r8:00000002 r7:60000113 r6:dff25d8c r5:847a3c00 r4:847a3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1b8c r4:84ae1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae1b8c r4:84a92d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a3c00 r8:84a92dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3536 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3536 tgid:3536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:847a6c00 r4:847a6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9c180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df921000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae138c r4:84ae1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae138c r4:84a92e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a6c00 r8:84a92e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92e00 r8:8027ed34 r7:dff25e60 r6:84a44680 r5:847a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aacd80 INFO: task kworker/1:138:3536 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c59eb000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfdff000 r4:84a92700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff49d84 r8:00000002 r7:60000013 r6:dff49d8c r5:847a4800 r4:847a4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a91fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae178c r4:84ae1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3540 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:847a5400 r4:847a5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2f8c r4:84ae2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3542 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3542 tgid:3542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84868000 r4:84868000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84868000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1f8c r4:84ae1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae1f8c r4:84a92f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:84a92fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92f80 r8:8027ed34 r7:dffede60 r6:84a44800 r5:84868000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aacec0 INFO: task kworker/1:141:3542 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3544 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfffdd84 r8:00000002 r7:60000113 r6:dfffdd8c r5:84869800 r4:84869800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84869800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfffde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac21c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ac5000 Exception stack(0xdfffdfb0 to 0xdfffdff8) r4:84ac20c0 Call trace: Exception stack(0xdffc1d20 to 0xdffc1d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:3546 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0005d84 r8:00000002 r7:60000113 r6:e0005d8c r5:8486b000 r4:8486b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae278c r4:84ae2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae278c r4:84ac5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:84ac50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5080 r8:8027ed34 r7:dffede60 r6:84a44900 r5:8486b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0005fb0 to 0xe0005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2180 INFO: task kworker/1:143:3546 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3548 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e000dd84 r8:00000002 r7:60000113 r6:e000dd8c r5:8486a400 r4:8486a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac23c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2b8c r4:84ae2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae2b8c r4:84ac5100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3551 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3551 tgid:3551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0019d84 r8:00000002 r7:60000013 r6:e0019d8c r5:8486bc00 r4:8486bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb49000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3f8c r4:84ae3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae3f8c r4:84ac5180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac5180 Exception stack(0xe0019fb0 to 0xe0019ff8) task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3552 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3552 tgid:3552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e001dd84 r8:00000002 r7:60000113 r6:e001dd8c r5:8486e000 r4:8486e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e001de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae338c r4:84ae3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae338c r4:84ac5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac5200 Exception stack(0xe001dfb0 to 0xe001dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac24c0 INFO: task kworker/1:146:3552 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7608000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3554 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0025d84 r8:00000002 r7:60000113 r6:e0025d8c r5:8486d400 r4:8486d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0025e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae378c r4:84ae3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae378c r4:84ac5280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:148:3556 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:8486ec00 r4:8486ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3b8c r4:84ae3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae3b8c r4:84ac5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:84ac532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5300 r8:8027ed34 r7:e0019e60 r6:84a44b80 r5:8486ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2880 INFO: task kworker/1:148:3556 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7c78000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3558 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3558 tgid:3558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e002dd84 r8:00000002 r7:60000113 r6:e002dd8c r5:8486c800 r4:8486c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae878c r4:84ae8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae878c r4:84ac5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84ac53ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5380 r8:8027ed34 r7:e0019e60 r6:84a44c00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2bc0 INFO: task kworker/1:149:3558 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7f73000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3559 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0031d84 r8:00000002 r7:60000013 r6:e0031d8c r5:84868c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfd05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae838c r4:84ae8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae838c r4:84ac5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868c00 r8:84ac542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5400 r8:8027ed34 r7:e002de60 r6:84a44c80 r5:84868c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2a40 INFO: task kworker/1:150:3559 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c8457000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3565 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3565 tgid:3565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffb9d84 r8:00000002 r7:60000013 r6:dffb9d8c r5:847e5400 r4:847e5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd71000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae8f8c r4:84ae8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae8f8c r4:84ac5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e5400 r8:84ac54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5480 r8:8027ed34 r7:e002de60 r6:84a44d80 r5:847e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:847a0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495e38c r4:8495e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495e38c r4:84a44d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a0000 r8:84a44d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44d00 r8:8027ed34 r7:dff59e60 r6:84a44e00 r5:847a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac19c0 INFO: task kworker/0:80:3566 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c8541000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:3567 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:3567 tgid:3567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0035d84 r8:00000002 r7:60000013 r6:e0035d8c r5:84738000 r4:84738000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84738000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84738000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae8b8c r4:84ae8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae8b8c r4:84ac5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84738000 r8:84ac552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5500 r8:8027ed34 r7:dffb9e60 r6:84a44e80 r5:84738000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ac2e80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c8ab0000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:D stack:0 pid:3570 tgid:3570 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84739800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae938c r4:84ae9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae938c r4:84ac5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84739800 r8:84ac55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5580 r8:8027ed34 r7:dffb9e60 r6:84a44f00 r5:84739800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b842c0 INFO: task kworker/1:153:3570 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:3572 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:3572 tgid:3572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0045d84 r8:00000002 r7:60000013 r6:e0045d8c r5:8473b000 r4:8473b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8473b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0045e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8473b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae9b8c r4:84ae9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae9b8c r4:84ac5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84ac5600 r8:8027ed34 r7:e003de60 r6:84a44f80 r5:8473b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:3574 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:3574 tgid:3574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84a8d400 r4:84a8d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84ac5680 r8:8027ed34 r7:e0045e60 r6:84ac5700 r5:84a8d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3576 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84a8ec00 r4:84a8ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae9f8c r4:84ae9c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae9f8c r4:84ac5780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8ec00 r8:84ac57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5780 r8:8027ed34 r7:e0045e60 r6:84ac5800 r5:84a8ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0041fb0 to 0xe0041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b843c0 INFO: task kworker/1:156:3576 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3577 tgid:3577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:84a8e000 r4:84a8e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aea38c r4:84aea000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aea38c r4:84ac5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8e000 r8:84ac58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5880 r8:8027ed34 r7:e0041e60 r6:84ac5900 r5:84a8e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0039fb0 to 0xe0039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b843c0 INFO: task kworker/1:157:3577 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c9809000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3580 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84a8bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aea78c r4:84aea400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aea78c r4:84ac5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8bc00 r8:84ac59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5980 r8:8027ed34 r7:e0039e60 r6:84ac5a00 r5:84a8bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe004dfb0 to 0xe004dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84740 INFO: task kworker/1:158:3580 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffc1fb0 to 0xdffc1ff8) r4:84aac240 task:kworker/1:159 state:D stack:0 pid:3582 tgid:3582 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ac5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5a80 r8:8027ed34 r7:e004de60 r6:84ac5b00 r5:84a88c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0055fb0 to 0xe0055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84880 INFO: task kworker/1:159:3582 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c9cff000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:160 state:D stack:0 pid:3584 tgid:3584 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aeaf8c r4:84aeac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aeaf8c r4:84ac5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86c00 r8:84ac5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5b80 r8:8027ed34 r7:e0055e60 r6:84ac5c00 r5:84a86c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0059fb0 to 0xe0059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84980 INFO: task kworker/1:160:3584 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ca165000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:84aac240 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b48000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aeb78c r4:84aeb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aeb78c r4:84ac5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b48000 r8:84ac5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5c80 r8:8027ed34 r7:e0059e60 r6:84ac5d00 r5:84b48000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0061fb0 to 0xe0061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84b40 INFO: task kworker/1:161:3587 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ca55e000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:162:3588 blocked for more than 453 seconds. r5:84b48c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff43000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aeb38c r4:84aeb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aeb38c r4:84ac5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b48c00 r8:84ac5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5d80 r8:8027ed34 r7:e0061e60 r6:84ac5e00 r5:84b48c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0051fb0 to 0xe0051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84b40 INFO: task kworker/1:162:3588 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cabaf000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dff69000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aebb8c r4:84aeb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aebb8c r4:84ac5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b49800 r8:84ac5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5e80 r8:8027ed34 r7:e0061e60 r6:84ac5f00 r5:84b49800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0065fb0 to 0xe0065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84fc0 INFO: task kworker/1:163:3590 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cb1ae000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:164 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aebf8c r4:84aebc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aebf8c r4:84ac5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4a400 r8:84ac5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5f80 r8:8027ed34 r7:e0065e60 r6:84b90000 r5:84b4a400 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84adaf8c r4:84adac00 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:84aac240 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af038c r4:84af0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af038c r4:84b90080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4b000 r8:84b900ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90080 r8:8027ed34 r7:e0071e60 r6:84b90100 r5:84b4b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0079fb0 to 0xe0079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97340 INFO: task kworker/1:165:3595 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cb616000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84af078c r4:84b90180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4bc00 r8:84b901ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90180 r8:8027ed34 r7:e0079e60 r6:84b90200 r5:84b4bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0069fb0 to 0xe0069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b971c0 INFO: task kworker/1:166:3596 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cb923000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:3598 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0085d84 r8:00000002 r7:60000113 r6:e0085d8c r5:84b4c800 r4:84b4c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b976c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0095000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0f8c r4:84af0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af0f8c r4:84b90280 r10:00000000 r9:84b90280 r8:8027ed34 r7:e0069e60 r6:84b90300 r5:84b4c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r5:84adaf8c r4:84adac00 r4:84a92700 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:3600 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:3600 tgid:3600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e008dd84 r8:00000002 r7:60000113 r6:e008dd8c r5:84b4d400 r4:84b4d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af0b8c r4:84b90380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4d400 r8:84b903ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90380 r8:8027ed34 r7:e0085e60 r6:84b90400 r5:84b4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97680 INFO: task kworker/1:168:3600 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:3603 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:3603 tgid:3603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:84b4e000 r4:84b4e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af138c r4:84af1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af138c r4:84b90480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4e000 r8:84b904ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90480 r8:8027ed34 r7:e0085e60 r6:84b90500 r5:84b4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0099fb0 to 0xe0099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97600 INFO: task kworker/1:169:3603 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cca30000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:dffc1dc0 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:170 state:D stack:0 pid:3604 tgid:3604 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84b4ec00 r4:84b4ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af1b8c r4:84af1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af1b8c r4:84b90580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4ec00 r8:84b905ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90580 r8:8027ed34 r7:e0099e60 r6:84b90600 r5:84b4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:171 state:D stack:0 pid:3606 tgid:3606 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b979c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b50000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af178c r4:84af1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af178c r4:84b90680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b50000 r8:84b906ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90680 r8:8027ed34 r7:e00a1e60 r6:84b90700 r5:84b50000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00adfb0 to 0xe00adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97c40 INFO: task kworker/1:171:3606 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ccef7000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:3608 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:3608 tgid:3608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00b5d84 r8:00000002 r7:60000013 r6:e00b5d8c r5:84b50c00 r4:84b50c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b50c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b5e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df91f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af1f8c r4:84af1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af1f8c r4:84b90780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b50c00 r8:84b907ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90780 r8:8027ed34 r7:e00a1e60 r6:84b90800 r5:84b50c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b5fb0 to 0xe00b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97ac0 INFO: task kworker/1:172:3608 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cd4cf000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:173 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b97e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b51800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af238c r4:84af2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af238c r4:84b90880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b51800 r8:84b908ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90880 r8:8027ed34 r7:e00b5e60 r6:84b90900 r5:84b51800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c5fb0 to 0xe00c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97ac0 INFO: task kworker/1:173:3609 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cdb43000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3612 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bab340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af2b8c r4:84af2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af2b8c r4:84b90980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b52400 r8:84b909ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90980 r8:8027ed34 r7:e00c5e60 r6:84b90a00 r5:84b52400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c1fb0 to 0xe00c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b97ec0 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bab040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af278c r4:84af2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af278c r4:84b90a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b53c00 r8:84b90aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90a80 r8:8027ed34 r7:e00c1e60 r6:84b90b00 r5:84b53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bab100 INFO: task kworker/1:175:3613 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ce2d0000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:3615 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84b54800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bab440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb99000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af2f8c r4:84af2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af2f8c r4:84b90b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b54800 r8:84b90bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90b80 r8:8027ed34 r7:e00c1e60 r6:84b90c00 r5:84b54800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d1fb0 to 0xe00d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bab100 INFO: task kworker/1:176:3615 is blocked on a mutex likely owned by task kworker/1:128:3515. Call trace: 1d60: 800f0013 ffffffff r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:84aac240 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84af338c r4:84af3000 r10:00000000 r9:84b90c80 r8:8027ed34 r7:e00d1e60 r6:84b90d00 r5:84b56000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bab700 INFO: task kworker/1:177:3620 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ce787000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:178:3621 blocked for more than 454 seconds. r10:829185c4 r9:e00ddd84 r8:00000002 r7:60000013 r6:e00ddd8c r5:84b56c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00dde08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b90d80 r8:8027ed34 r7:e00d9e60 r6:84b90e00 r5:84b56c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00ddfb0 to 0xe00ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bab640 INFO: task kworker/1:178:3621 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ced54000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:84b53000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84af3b8c r4:84b90e80 Exception stack(0xe00cdfb0 to 0xe00cdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cf073000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac240 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:e00d5d84 r8:00000002 r7:60000113 r6:e00d5d8c r5:84b58c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baba80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af3f8c r4:84af3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84af3f8c r4:84b90f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b58c00 r8:84b90fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b90f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90f80 r8:8027ed34 r7:e00cde60 r6:84bb1000 r5:84b58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d5fb0 to 0xe00d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bab3c0 INFO: task kworker/1:180:3624 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r4:84a92700 Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:3626 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:3626 tgid:3626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84b5a400 r4:84b5a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b5a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bb1080 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00f5d84 r8:00000002 r7:60000113 r6:e00f5d8c r5:84b59800 r4:84b59800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b59800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b59800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495fb8c r4:8495f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495fb8c r4:84bb6000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b59800 r8:84bb602c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6000 r8:8027ed34 r7:dff59e60 r6:84bb1180 r5:84b59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f5fb0 to 0xe00f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85100 INFO: task kworker/0:81:3630 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cfb35000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:82:3631 blocked for more than 454 seconds. r5:84b5bc00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845b6f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495eb8c r4:8495e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495eb8c r4:84bb6080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5bc00 r8:84bb60ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6080 r8:8027ed34 r7:e00f5e60 r6:84bb1200 r5:84b5bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85100 INFO: task kworker/0:82:3631 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cfc31000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:83 state:D stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0101e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfe01000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ef8c r4:8495ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495ef8c r4:84bb6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5c800 r8:84bb612c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6100 r8:8027ed34 r7:e00f5e60 r6:84bb1280 r5:84b5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0101fb0 to 0xe0101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b857c0 INFO: task kworker/0:83:3633 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: cfe54000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84aac240 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84b58000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0105e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afcb8c r4:84afc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afcb8c r4:84bb1300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b58000 r8:84bb132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1300 r8:8027ed34 r7:e00e5e60 r6:84bb1380 r5:84b58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba4100 INFO: task kworker/1:182:3635 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: d01f1000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 r4:00000000 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0109d84 r8:00000002 r7:60000013 r6:e0109d8c r5:84b5d400 r4:84b5d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b5d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0109e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba46c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b5d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afc78c r4:84afc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afc78c r4:84bb1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5d400 r8:84bb142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1400 r8:8027ed34 r7:e0105e60 r6:84bb1480 r5:84b5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0109fb0 to 0xe0109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba4100 INFO: task kworker/1:183:3636 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d0362000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfdff000 r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3638 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3638 tgid:3638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84b5ec00 r4:84b5ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b5ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0111e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba7040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b5ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495f38c r4:8495f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495f38c r4:84bb6180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5ec00 r8:84bb61ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6180 r8:8027ed34 r7:e00f5e60 r6:84bb1500 r5:84b5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0111fb0 to 0xe0111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba7000 INFO: task kworker/0:84:3638 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 1d20: d0574000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3639 blocked for more than 454 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:84b55400 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0119e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bb6200 r8:8027ed34 r7:e00f5e60 r6:84bb1580 r5:84b55400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc1d20 to 0xdffc1d68) r4:82abf1e4 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3643 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3643 tgid:3643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0115d84 r8:00000002 r7:60000013 r6:e0115d8c r5:84b5b000 r4:84b5b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b5b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0115e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe93000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afd38c r4:84afd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afd38c r4:84bb1600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5b000 r8:84bb162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1600 r8:8027ed34 r7:e0105e60 r6:84bb1680 r5:84b5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0115fb0 to 0xe0115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba4800 INFO: task kworker/1:184:3643 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d0bd3000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:185:3645 blocked for more than 455 seconds. r4:84b5e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bb1700 r8:8027ed34 r7:e0115e60 r6:84bb1780 r5:84b5e000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba4800 INFO: task kworker/1:185:3645 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d0def000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:3647 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bb1800 Exception stack(0xe011dfb0 to 0xe011dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d1039000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:3649 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:3649 tgid:3649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0121d84 r8:00000002 r7:60000113 r6:e0121d8c r5:84b60c00 r4:84b60c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b60c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0121e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afdf8c r4:84afdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afdf8c r4:84bb1900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b60c00 r8:84bb192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1900 r8:8027ed34 r7:e011de60 r6:84bb1980 r5:84b60c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0121fb0 to 0xe0121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba4b80 INFO: task kworker/1:187:3649 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d1257000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:188:3650 blocked for more than 455 seconds. task:kworker/1:188 state:D stack:0 pid:3650 tgid:3650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00e1d84 r8:00000002 r7:60000013 r6:e00e1d8c r5:84b61800 r4:84b61800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b61800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b61800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff97000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afdb8c r4:84afd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afdb8c r4:84bb1a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b61800 r8:84bb1a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1a00 r8:8027ed34 r7:e0121e60 r6:84bb1a80 r5:84b61800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:3653 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0131d84 r8:00000002 r7:60000013 r6:e0131d8c r5:8473c800 r4:8473c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8473c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0131e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb4140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8473c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0149000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84afef8c r4:84bb1b00 Exception stack(0xe0131fb0 to 0xe0131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba43c0 INFO: task kworker/1:189:3653 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d16fd000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3654 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84babd80 r5:84afe38c r4:84afe000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3656 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0139d84 r8:00000002 r7:60000113 r6:e0139d8c r5:84b63000 r4:84b63000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b63000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0139e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba4340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b63000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba4fc0 INFO: task kworker/1:191:3656 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d1d83000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:3659 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0129d84 r8:00000002 r7:60000013 r6:e0129d8c r5:84b64800 r4:84b64800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b64800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0129e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb4000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0143000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afeb8c r4:84afe800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84afeb8c r4:84bb1d80 r10:61c88647 r9:84b64800 r8:84bb1dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d2226000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3660 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e014dd84 r8:00000002 r7:60000113 r6:e014dd8c r5:84b65400 r4:84b65400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b65400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e014de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb44c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0157000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aff38c r4:84aff000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aff38c r4:84bb1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b65400 r8:84bb1eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1e80 r8:8027ed34 r7:e0131e60 r6:84bb1f00 r5:84b65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe014dfb0 to 0xe014dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb4200 INFO: task kworker/1:193:3660 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d262c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:3662 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0155d84 r8:00000002 r7:60000113 r6:e0155d8c r5:84b66000 r4:84b66000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b66000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0155e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb45c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b66000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aff78c r4:84aff400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aff78c r4:84bb1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b66000 r8:84bb1fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb1f80 r8:8027ed34 r7:e014de60 r6:84bbd000 r5:84b66000 Exception stack(0xe0155fb0 to 0xe0155ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb4200 INFO: task kworker/1:194:3662 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d288c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3665 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3665 tgid:3665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0169d84 r8:00000002 r7:60000113 r6:e0169d8c r5:8473bc00 r4:8473bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8473bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0169e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb4ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8473bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8500078c r4:84bbd080 r10:00000000 r9:84bbd080 r8:8027ed34 r7:e0155e60 r6:84bb6300 r5:8473bc00 r4:84bb4540 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d2b67000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:3666 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0175d84 r8:00000002 r7:60000113 r6:e0175d8c r5:8473e000 r4:8473e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8473e000 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb4740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8473e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e016b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84affb8c r4:84aff800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84affb8c r4:84bbd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8473e000 r8:84bbd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 r4:84bb4540 INFO: task kworker/1:196:3666 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d2d93000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:3669 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0171000 r10:61c88647 r9:8473ec00 r8:84bbd1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d32ed000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:3670 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:3670 tgid:3670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e018dd84 r8:00000002 r7:60000113 r6:e018dd8c r5:8473d400 r4:8473d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8473d400 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e018de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb49c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8473d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0187000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500038c r4:85000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500038c r4:84bbd200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8473d400 r8:84bbd22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe018dfb0 to 0xe018dff8) r4:84bb47c0 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r4:00000001 Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:3672 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:3672 tgid:3672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e019dd84 r8:00000002 r7:60000113 r6:e019dd8c r5:838a0000 r4:838a0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838a0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e019de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:838a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 r10:61c88647 r9:838a0000 r8:84bbd2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d3689000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:3674 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85000b8c r4:85000800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85000b8c r4:84bbd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8473a400 r8:84bbd32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd300 r8:8027ed34 r7:e019de60 r6:84bb6580 r5:8473a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a9fb0 to 0xe01a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb4a40 INFO: task kworker/1:200:3674 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:201:3676 blocked for more than 455 seconds. r10:829185c4 r9:e01b9d84 r8:00000002 r7:60000113 r6:e01b9d8c r5:84738c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb4d00 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85000f8c r4:85000c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85000f8c r4:84bbd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84738c00 r8:84bbd3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd380 r8:8027ed34 r7:e019de60 r6:84bb6600 r5:84738c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb4d80 INFO: task kworker/1:201:3676 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d3d2a000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:3678 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e01bdd84 r8:00000002 r7:60000013 r6:e01bdd8c r5:847e8000 r4:847e8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf2c0 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bbd400 r8:8027ed34 r7:e019de60 r6:84bb6680 r5:847e8000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r5:84adaf8c r4:84adac00 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3680 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e01a5d84 r8:00000002 r7:60000113 r6:e01a5d8c r5:847e8c00 r4:847e8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830dc440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ff8c r4:8495fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495ff8c r4:84bb6700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e8c00 r8:84bb672c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6700 r8:8027ed34 r7:e00f5e60 r6:84bb6780 r5:847e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 800f0013 ffffffff r4:dffc1dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3682 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df901d84 r8:00000002 r7:60000013 r6:df901d8c r5:847e9800 r4:847e9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df901e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb31000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2038c r4:84b20000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bb6800 r8:8027ed34 r7:e01a5e60 r6:84bb6880 r5:847e9800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:3684 blocked for more than 455 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0141d84 r8:00000002 r7:60000013 r6:e0141d8c r5:847ea400 r4:847ea400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ea400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0141e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84246f8c r4:84246c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84246f8c r4:84bb6900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ea400 r8:84bb692c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6900 r8:8027ed34 r7:df901e60 r6:84bb6980 r5:847ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0141fb0 to 0xe0141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba71c0 INFO: task kworker/0:88:3684 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d47fa000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r4:dffc1dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85001b8c r4:85001800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85001b8c r4:84bbd480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847eb000 r8:84bbd4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd480 r8:8027ed34 r7:e01bde60 r6:84bb6a00 r5:847eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01e1fb0 to 0xe01e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:204:3692 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:847ec800 r4:847ec800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ec800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc33c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85001f8c r4:85001c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85001f8c r4:84bbd500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ec800 r8:84bbd52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd500 r8:8027ed34 r7:e01e1e60 r6:84bb6a80 r5:847ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3540 INFO: task kworker/1:204:3692 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d4dcf000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3693 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3693 tgid:3693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04f9d84 r8:00000002 r7:60000013 r6:e04f9d8c r5:847ed400 r4:847ed400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ed400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc34c0 r5:8500238c r4:85002000 r7:ddde2d40 r6:83018200 r5:8500238c r4:84bbd580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ed400 r8:84bbd5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd580 r8:8027ed34 r7:e04f5e60 r6:84bb6b00 r5:847ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3540 INFO: task kworker/1:205:3693 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d4f88000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r4:dffc1dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04fdd84 r8:00000002 r7:60000013 r6:e04fdd8c r5:847ee000 r4:847ee000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ee000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc35c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500278c r4:85002400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500278c r4:84bbd600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ee000 r8:84bbd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd600 r8:8027ed34 r7:e04f9e60 r6:84bb6b80 r5:847ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3540 INFO: task kworker/1:206:3694 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r5:84adaf8c r4:84adac00 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3695 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0501d84 r8:00000002 r7:60000113 r6:e0501d8c r5:847eec00 r4:847eec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847eec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfdc9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3696 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:85038000 r4:85038000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85038000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85038000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85002b8c r4:85002800 r10:00000000 r9:84bbd700 r8:8027ed34 r7:e0501e60 r6:84bb6c80 r5:85038000 r4:84bc3540 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3699 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3699 tgid:3699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85038c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r4:dffc1dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3702 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:85039800 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bb6e00 Exception stack(0xe04edfb0 to 0xe04edff8) r4:84bc8d80 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc1d20 to 0xdffc1d68) r4:dffc1dc0 r4:00000000 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3703 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e01d9d84 r8:00000002 r7:60000113 r6:e01d9d8c r5:8503a400 r4:8503a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2078c r4:84b20400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2078c r4:84bb6f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503a400 r8:84bb6f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb6f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6f00 r8:8027ed34 r7:e04ede60 r6:84bb6f80 r5:8503a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d9fb0 to 0xe01d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc8d80 INFO: task kworker/0:91:3703 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) r5:800f0013 r4:80239bd0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffc1fb0 to 0xdffc1ff8) task:kworker/0:92 state:D stack:0 pid:3705 tgid:3705 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b20b8c r4:84b20800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b20b8c r4:830de200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503b000 r8:830de22c r7:82804d40 r6:dddced40 r5:dddced60 r4:830de200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830de200 r8:8027ed34 r7:e04ede60 r6:830cdf00 r5:8503b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe050dfb0 to 0xe050dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc8c00 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000001 INFO: task kworker/0:93:3707 blocked for more than 456 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0515e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd33000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b20f8c r4:84b20c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b20f8c r4:84bc9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503c800 r8:84bc902c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9000 r8:8027ed34 r7:e04ede60 r6:84bc9080 r5:8503c800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:3708 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:3708 tgid:3708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0519d84 r8:00000002 r7:60000013 r6:e0519d8c r5:8503d400 r4:8503d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0519e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2138c r4:84b21000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2138c r4:84bc9100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503d400 r8:84bc912c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9100 r8:8027ed34 r7:e04ede60 r6:84bc9180 r5:8503d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc8f80 INFO: task kworker/0:94:3708 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d67bc000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffc1dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adaf8c r4:84adac00 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:3711 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:8503bc00 r4:8503bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21f8c r4:84b21c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b21f8c r4:84bc9200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503bc00 r8:84bc922c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9200 r8:8027ed34 r7:e04ede60 r6:84bc9280 r5:8503bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc2100 INFO: task kworker/0:95:3711 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d6aec000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3713 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3713 tgid:3713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0525d84 r8:00000002 r7:60000113 r6:e0525d8c r5:844b0000 r4:844b0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85002f8c r4:85002c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85002f8c r4:84bbd780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0000 r8:84bbd7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd780 r8:8027ed34 r7:e0501e60 r6:84bc9300 r5:844b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0525fb0 to 0xe0525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3b80 INFO: task kworker/1:209:3713 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d700a000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3716 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0531d84 r8:00000002 r7:60000113 r6:e0531d8c r5:844b0c00 r4:844b0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0531e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85004b8c r4:85004800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85004b8c r4:84bbd800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0c00 r8:84bbd82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0531fb0 to 0xe0531ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3717 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:3717 tgid:3717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0535d84 r8:00000002 r7:60000113 r6:e0535d8c r5:844b2400 r4:844b2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500378c r4:85003400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500378c r4:84bbd880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b2400 r8:84bbd8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd880 r8:8027ed34 r7:e0531e60 r6:84bc9400 r5:844b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0535fb0 to 0xe0535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3d80 INFO: task kworker/1:211:3717 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d7890000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:3719 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0539d84 r8:00000002 r7:60000113 r6:e0539d8c r5:844b1800 r4:844b1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21b8c r4:84b21800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b21b8c r4:84bc9480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b1800 r8:84bc94ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9480 r8:8027ed34 r7:e051de60 r6:84bc9500 r5:844b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc24c0 INFO: task kworker/0:96:3719 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d7b09000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:212 state:D stack:0 pid:3721 tgid:3721 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:844b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:844b4800 r8:84bbd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbd900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd900 r8:8027ed34 r7:e0531e60 r6:84bc9580 r5:844b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3ec0 INFO: task kworker/1:212:3721 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d8372000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:3723 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:3723 tgid:3723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e054dd84 r8:00000002 r7:60000013 r6:e054dd8c r5:844b3c00 r4:844b3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b3c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc28c0 r9:83018005 r8:844b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2238c r4:84b22000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2238c r4:84bc9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3c00 r8:84bc962c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9600 r8:8027ed34 r7:e051de60 r6:84bc9680 r5:844b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe054dfb0 to 0xe054dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc2900 INFO: task kworker/0:97:3723 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:844b6000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bbd980 r8:8027ed34 r7:e0531e60 r6:84bc9780 r5:844b6000 Exception stack(0xe0555fb0 to 0xe0555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3a40 INFO: task kworker/1:213:3725 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d88e3000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829185c4 r9:e0559d84 r8:00000002 r7:60000113 r6:e0559d8c r5:844b5400 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc2480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2278c r4:84b22400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2278c r4:84bc9700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b5400 r8:84bc972c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9700 r8:8027ed34 r7:e054de60 r6:84bc9800 r5:844b5400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:99 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0551e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b22f8c r4:84b22c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b22f8c r4:84bc9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3000 r8:84bc98ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9880 r8:8027ed34 r7:e0559e60 r6:84bc9900 r5:844b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84bc2880 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829185c4 r9:e055dd84 r8:00000002 r7:60000113 r6:e055dd8c r5:844b6c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e055de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b22b8c r4:84b22800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b22b8c r4:84bc9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b6c00 r8:84bc99ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9980 r8:8027ed34 r7:e0551e60 r6:84bc9a00 r5:844b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc2880 INFO: task kworker/0:100:3731 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:3733 blocked for more than 456 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0511d84 r8:00000002 r7:60000113 r6:e0511d8c r5:8503ec00 r4:8503ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8503ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0049000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2338c r4:84b23000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2338c r4:84bc9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503ec00 r8:84bc9aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9a80 r8:8027ed34 r7:e0551e60 r6:84bc9b00 r5:8503ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0511fb0 to 0xe0511ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:84b63c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500438c r4:85004000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500438c r4:84bbda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b63c00 r8:84bbda2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbda00 r8:8027ed34 r7:e0531e60 r6:84bbda80 r5:84b63c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb4f40 INFO: task kworker/1:214:3736 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d927a000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffc1dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e0565d84 r8:00000002 r7:60000113 r6:e0565d8c r5:84b66c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3340 INFO: task kworker/0:102:3737 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d94d7000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:103 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc9c00 r8:8027ed34 r7:e0565e60 r6:84bbdb80 r5:847ebc00 r4:84bd3480 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d9928000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:104:3742 blocked for more than 457 seconds. r5:84b68000 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bd3400 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:3743 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:105 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0571d84 r8:00000002 r7:60000113 r6:e0571d8c r5:84b68c00 r4:84b68c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b68c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0089000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b23f8c r4:84b23c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b23f8c r4:84bc9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b68c00 r8:84bc9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc9d00 r8:8027ed34 r7:e056de60 r6:84bbdc80 r5:84b68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0571fb0 to 0xe0571ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc1d20 to 0xdffc1d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:3748 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0521d84 r8:00000002 r7:60000113 r6:e0521d8c r5:84b69800 r4:84b69800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b69800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b69800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500478c r4:85004400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500478c r4:84bbdd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b69800 r8:84bbddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbdd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbdd80 r8:8027ed34 r7:e0531e60 r6:84bbde00 r5:84b69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcf5c0 INFO: task kworker/1:215:3748 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: d9e27000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:3752 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e009dd84 r8:00000002 r7:60000013 r6:e009dd8c r5:84b6a400 r4:84b6a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b6a400 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf780 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfdff000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3753 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00bdd84 r8:00000002 r7:60000013 r6:e00bdd8c r5:84b6b000 r4:84b6b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b6b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcfb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500578c r4:85005400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500578c r4:84bbdf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6b000 r8:84bbdf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bbdf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbdf00 r8:8027ed34 r7:e009de60 r6:84bbdf80 r5:84b6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcf580 INFO: task kworker/1:217:3753 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: da246000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:106:3754 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:843b0000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0161e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0161fb0 to 0xe0161ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3b80 INFO: task kworker/0:106:3754 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: da5ce000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:218 state:D stack:0 pid:3756 tgid:3756 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0179e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfc39000 r7:ddde2d40 r6:83018200 r5:8500538c r4:84bd7000 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: da5ce000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:3758 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:3758 tgid:3758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcfc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85005b8c r4:85005800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85005b8c r4:84bd7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6bc00 r8:84bd70ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7080 r8:8027ed34 r7:e00bde60 r6:84bd7100 r5:84b6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00edfb0 to 0xe00edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcfa40 INFO: task kworker/1:219:3758 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3760 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500638c r4:85006000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500638c r4:84bd7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6d400 r8:84bd71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7180 r8:8027ed34 r7:e00ede60 r6:84bd7200 r5:84b6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01c9fb0 to 0xe01c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcfa40 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e017de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85005f8c r4:84bd7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6e000 r8:84bd72ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7280 r8:8027ed34 r7:e01c9e60 r6:84bd7300 r5:84b6e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe017dfb0 to 0xe017dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcfb80 INFO: task kworker/1:221:3761 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: db1d7000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:107:3763 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0579d84 r8:00000002 r7:60000113 r6:e0579d8c r5:84b70000 r4:84b70000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b70000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0579e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b70000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b2c78c r4:84b2c400 r10:00000000 r9:84bc9f00 r8:8027ed34 r7:e0161e60 r6:84bd7380 r5:84b70000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:222 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:84b71800 r4:84b71800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b71800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe31000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500678c r4:85006400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500678c r4:84bd7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b71800 r8:84bd742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7400 r8:8027ed34 r7:e01c9e60 r6:84bd7480 r5:84b71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe057dfb0 to 0xe057dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdd080 INFO: task kworker/1:222:3765 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: db833000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3766 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84b72400 r4:84b72400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b72400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd9c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffaf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500738c r4:85007000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500738c r4:84bd7500 r4:84bd7500 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdd080 INFO: task kworker/1:223:3766 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dbb4d000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:84aac240 INFO: task kworker/1:224:3769 blocked for more than 457 seconds. r4:843b1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85006b8c r4:85006800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85006b8c r4:84bd7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b1800 r8:84bd762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7600 r8:8027ed34 r7:e0581e60 r6:84bc9f80 r5:843b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0589fb0 to 0xe0589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdd6c0 INFO: task kworker/1:224:3769 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dbcfa000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:225:3770 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:843b3c00 r4:843b3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85006f8c r4:84bd7680 dfa0: 00000000 00000000 00000000 00000000 r4:84bdd780 INFO: task kworker/1:225:3770 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dc020000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:226 state:D stack:0 pid:3774 tgid:3774 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdda80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500778c r4:85007400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500778c r4:84bd7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b4800 r8:84bd772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7700 r8:8027ed34 r7:e0581e60 r6:84be2080 r5:843b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0575fb0 to 0xe0575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdd780 INFO: task kworker/1:226:3774 is blocked on a mutex likely owned by task kworker/1:128:3515. Call trace: 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:227 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501038c r4:85010000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501038c r4:84bd7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73000 r8:84bd77ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7780 r8:8027ed34 r7:e0575e60 r6:84bd7800 r5:84b73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0585fb0 to 0xe0585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdd780 INFO: task kworker/1:227:3775 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dc51b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:108:3776 blocked for more than 457 seconds. r5:84b73c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:84b73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r10:61c88647 r9:84b73c00 r8:84be212c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84be2100 r8:8027ed34 r7:e0161e60 r6:84bd7880 r5:84b73c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0591fb0 to 0xe0591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc3240 INFO: task kworker/0:108:3776 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dca56000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3778 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0599d84 r8:00000002 r7:60000113 r6:e0599d8c r5:84b75400 r4:84b75400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b75400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bd7900 Exception stack(0xe0599fb0 to 0xe0599ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bddac0 INFO: task kworker/1:228:3778 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dcc18000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84b76000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bd7a00 r8:8027ed34 r7:e0585e60 r6:84bd7a80 r5:84b76000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdde40 INFO: task kworker/1:229:3781 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dcf0b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:230:3783 blocked for more than 457 seconds. r4:84b76c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e013d000 r10:61c88647 r9:84b76c00 r8:84bd7b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dd220000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3785 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05a5d84 r8:00000002 r7:60000013 r6:e05a5d8c r5:84b74800 r4:84b74800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b74800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e014f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85010b8c r4:85010800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85010b8c r4:84bd7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:84bd7c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7c00 r10:00000000 r9:84bd7c00 r8:8027ed34 r7:e05a1e60 r6:84bd7c80 r5:84b74800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:3787 blocked for more than 457 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05a9d84 r8:00000002 r7:60000013 r6:e05a9d8c r5:84b70c00 r4:84b70c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b70c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be53c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e017f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501138c r4:85011000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501138c r4:84bd7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b70c00 r8:84bd7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7d00 r8:8027ed34 r7:e05a5e60 r6:84bd7d80 r5:84b70c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a9fb0 to 0xe05a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be52c0 INFO: task kworker/1:232:3787 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:233 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5080 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85010f8c r4:85010c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85010f8c r4:84bd7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6ec00 r8:84bd7e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7e00 r8:8027ed34 r7:e05a9e60 r6:84bd7e80 r5:84b6ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d20: ddd1f000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:234 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85011f8c r4:85011c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85011f8c r4:84bd7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6c800 r8:84bd7f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bd7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7f00 r8:8027ed34 r7:e05a9e60 r6:84bd7f80 r5:84b6c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be5380 INFO: task kworker/1:234:3791 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: de0ac000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:3792 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e059dd84 r8:00000002 r7:60000013 r6:e059dd8c r5:84b78c00 r4:84b78c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b78c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e018f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8501178c r4:84bed000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:3794 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:84b79800 r4:84b79800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b79800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b79800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e019f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85011b8c r4:85011800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85011b8c r4:84bed100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b79800 r8:84bed12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed100 r8:8027ed34 r7:e05b5e60 r6:84be2180 r5:84b79800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05bdfb0 to 0xe05bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be54c0 INFO: task kworker/1:236:3794 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: de6d6000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:237:3797 blocked for more than 458 seconds. r10:829185c4 r9:e05cdd84 r8:00000002 r7:60000113 r6:e05cdd8c r5:843b5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e6000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85012b8c r4:85012800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85012b8c r4:84bed180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b5400 r8:84bed1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed180 r8:8027ed34 r7:e05b5e60 r6:84be2200 r5:843b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05cdfb0 to 0xe05cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be5940 INFO: task kworker/1:237:3797 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: df0be000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3798 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d1d84 r8:00000002 r7:60000013 r6:e05d1d8c r5:843b6000 r4:843b6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501238c r4:85012000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501238c r4:84bed280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b6000 r8:84bed2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed280 r8:8027ed34 r7:e05cde60 r6:84be2280 r5:843b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 1d20: df427000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdffc1fb0 to 0xdffc1ff8) r4:84aac240 INFO: task kworker/1:239:3800 blocked for more than 458 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d9d84 r8:00000002 r7:60000113 r6:e05d9d8c r5:843b6c00 r4:843b6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501278c r4:85012400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:843b6c00 r8:84bed22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:240:3802 blocked for more than 458 seconds. r4:843b0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5ec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:84bed300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b0c00 r8:84bed32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed300 r8:8027ed34 r7:e05cde60 r6:84be2380 r5:843b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be5c80 INFO: task kworker/1:240:3802 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: df91c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3804 blocked for more than 458 seconds. task:kworker/1:241 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85012f8c r4:84bed380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a8000 r8:84bed3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed380 r8:8027ed34 r7:e05e1e60 r6:84be2400 r5:843a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be5c00 INFO: task kworker/1:241:3804 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: dfbc5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:3806 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:843a9800 r4:843a9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:843a9800 r8:84bed42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) r5:900f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:3808 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:843ab000 r4:843ab000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ab000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df979000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85013b8c r4:85013800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85013b8c r4:84bed480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ab000 r8:84bed4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed480 r8:8027ed34 r7:e0609e60 r6:84be2500 r5:843ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be5f00 INFO: task kworker/1:243:3808 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:00000000 9d20: 7f6cd000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 r5:84adb38c r4:84adb000 r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:3810 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0529d84 r8:00000002 r7:60000113 r6:e0529d8c r5:843aa400 r4:843aa400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843aa400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85018b8c r4:85018800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85018b8c r4:84bed500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843aa400 r8:84bed52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed500 r8:8027ed34 r7:e0611e60 r6:84be2580 r5:843aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfb140 INFO: task kworker/1:244:3810 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 7f915000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:3812 blocked for more than 458 seconds. task:kworker/1:245 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:843a8c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85013f8c r4:85013c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85013f8c r4:84bed580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a8c00 r8:84bed5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed580 r8:8027ed34 r7:e0529e60 r6:84be2600 r5:843a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfb0c0 INFO: task kworker/1:245:3812 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 7f915000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 900f0013 ffffffff r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:3814 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:843abc00 r4:843abc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bed600 r8:8027ed34 r7:e0529e60 r6:84be2680 r5:843abc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:843ac800 r4:843ac800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ac800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501878c r4:85018400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501878c r4:84bed680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ac800 r8:84bed6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed680 r8:8027ed34 r7:e0529e60 r6:84be2700 r5:843ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfb3c0 INFO: task kworker/1:247:3816 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 800c9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3818 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:843ad400 r4:843ad400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ad400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfbb40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff31000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501978c r4:85019400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501978c r4:84bed700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ad400 r8:84bed72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed700 r8:8027ed34 r7:e0529e60 r6:84be2780 r5:843ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfb3c0 INFO: task kworker/1:248:3818 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8084d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:3820 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:3820 tgid:3820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:84b7b000 r4:84b7b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b7b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfbe00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501938c r4:85019000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501938c r4:84bed780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7b000 r8:84bed7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bed780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed780 r8:8027ed34 r7:e0651e60 r6:84bed800 r5:84b7b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfb600 INFO: task kworker/1:249:3820 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 80eaa000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:84aac340 INFO: task kworker/0:109:3824 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:e0661d84 r8:00000002 r7:60000013 r6:e0661d8c r5:84b7c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:e0767000 r5:85022b8c r4:85022800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84be2800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be282c r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2800 r8:8027ed34 r7:e0161e60 r6:84bed880 r5:84b7c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be7500 INFO: task kworker/0:109:3824 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 81159000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:3825 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:84b7a400 r4:84b7a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b7a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b7a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2d78c r4:84b2d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2d78c r4:84be2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7a400 r8:84be28ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2880 r8:8027ed34 r7:e0661e60 r6:84bed900 r5:84b7a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be7500 INFO: task kworker/0:110:3825 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 81515000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r5:800f0013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:111:3827 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:3827 tgid:3827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0679d84 r8:00000002 r7:60000113 r6:e0679d8c r5:84b7bc00 r4:84b7bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b7bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfbd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85018f8c r4:85018c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85018f8c r4:84be2900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:84be292c r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2900 r8:8027ed34 r7:e0661e60 r6:84bed980 r5:84b7bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b5100 INFO: task kworker/0:111:3827 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 81952000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:3828 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:e05b9d84 r8:00000002 r7:60000113 r6:e05b9d8c r5:843aec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b9e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfee3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05b9fb0 to 0xe05b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:113:3831 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:113 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0681d84 r8:00000002 r7:60000113 r6:e0681d8c r5:84b7e000 r4:84b7e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:3834 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:3834 tgid:3834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e066dd84 r8:00000002 r7:60000113 r6:e066dd8c r5:84b7ec00 r4:84b7ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b7ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85019b8c r4:85019800 r4:84beda80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe066dfb0 to 0xe066dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfbd00 INFO: task kworker/1:250:3834 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 82114000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa1c0 r7:ddde2d40 r6:83018200 r5:8501a38c r4:84bedb80 Exception stack(0xe05c1fb0 to 0xe05c1ff8) task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3838 blocked for more than 458 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:84b78000 r4:84b78000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b78000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b78000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85019f8c r4:85019c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85019f8c r4:84bedc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b78000 r8:84bedcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bedc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedc80 r8:8027ed34 r7:e05c1e60 r6:84bedd00 r5:84b78000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa140 INFO: task kworker/1:252:3838 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 82d83000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e06a5d84 r8:00000002 r7:60000013 r6:e06a5d8c r5:85070c00 r4:85070c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85070c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85070c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0001000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501a78c r4:8501a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501a78c r4:84bedd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070c00 r8:84beddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bedd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedd80 r8:8027ed34 r7:e05c1e60 r6:84bede00 r5:85070c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa180 INFO: task kworker/1:253:3840 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8503e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0073000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501b38c r4:8501b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501b38c r4:84bede80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503e000 r8:84bedeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bede80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bede80 r8:8027ed34 r7:e06a5e60 r6:84be2b00 r5:8503e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa400 INFO: task kworker/1:254:3842 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 83610000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:255 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e000f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ab8c r4:8501a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501ab8c r4:84bedf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ae000 r8:84bedf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bedf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedf00 r8:8027ed34 r7:e06a9e60 r6:84be2b80 r5:843ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06adfb0 to 0xe06adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa540 INFO: task kworker/1:255:3844 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 83610000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa640 r5:8501af8c r4:8501ac00 r10:00000000 r9:84bedf80 r8:8027ed34 r7:e06a9e60 r6:84be2c00 r5:843b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b5fb0 to 0xe06b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfa740 INFO: task kworker/1:256:3845 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 83a65000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85050000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0087000 r7:ddde2d40 r6:83018200 r5:8501b78c r4:850ad000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8407f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:3850 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:3850 tgid:3850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06d9d84 r8:00000002 r7:60000013 r6:e06d9d8c r5:85052400 r4:85052400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85052400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfae80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85052400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0647000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502078c r4:85020400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502078c r4:850ad080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:850ad080 r8:8027ed34 r7:e06d1e60 r6:84be2d00 r5:85052400 r4:84bfaa40 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3851 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:85053000 r4:85053000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85053000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfaa80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e4000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501bb8c r4:8501b800 r10:61c88647 r9:85053000 r8:850ad12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:3854 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:3854 tgid:3854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06e9d84 r8:00000002 r7:60000013 r6:e06e9d8c r5:85051800 r4:85051800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85051800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfab40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85051800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501bf8c r4:8501bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501bf8c r4:850ad180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85051800 r8:850ad1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad180 r8:8027ed34 r7:e06d9e60 r6:84be2e00 r5:85051800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfaa40 INFO: task kworker/1:260:3854 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:261 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfac80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85071800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0545000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502038c r4:85020000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502038c r4:850ad200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85071800 r8:850ad22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad200 r8:8027ed34 r7:e06d9e60 r6:850ad280 r5:85071800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfab80 INFO: task kworker/1:261:3855 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 84d57000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:262:3858 blocked for more than 459 seconds. r10:829185c4 r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:85072400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85072400 r8:850ad32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:850ad300 r8:8027ed34 r7:e06d9e60 r6:850ad380 r5:85072400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfadc0 INFO: task kworker/1:262:3858 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 853d0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:3859 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85050c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bfaf00 INFO: task kworker/1:263:3859 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 853d0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:3863 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0709d84 r8:00000002 r7:60000113 r6:e0709d8c r5:85055400 r4:85055400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85055400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bc680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85055400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0735000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85021f8c r4:85021c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85021f8c r4:850ad480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0709fb0 to 0xe0709ff8) r4:850bc100 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 task:kworker/0:114 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:85056000 r4:85056000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85056000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bc580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85056000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85021b8c r4:85021800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85021b8c r4:84be2f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85056000 r8:84be2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84be2f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2f80 r8:8027ed34 r7:e0661e60 r6:850c5000 r5:85056000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b52c0 INFO: task kworker/0:114:3864 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 85ef6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 task:kworker/1:265 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850ad500 r8:8027ed34 r7:e0709e60 r6:850c5080 r5:85053c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 86208000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:3867 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:85058000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bcb40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0771000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022f8c r4:85022c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85022f8c r4:850ad600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85059800 r8:850ad62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad600 r8:8027ed34 r7:e0709e60 r6:850c5180 r5:85059800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000001 r4:84aac340 task:kworker/1:268 state:D stack:0 pid:3873 tgid:3873 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502238c r4:85022000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502238c r4:850ad680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505a400 r8:850ad6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad680 r8:8027ed34 r7:e0731e60 r6:850c5200 r5:8505a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:3874 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0751d84 r8:00000002 r7:60000013 r6:e0751d8c r5:85058c00 r4:85058c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85058c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bc9c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850ad700 r8:8027ed34 r7:e0731e60 r6:850c5280 r5:85058c00 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:8505bc00 r4:8505bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8505bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8505bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0757000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2e38c r4:84b2e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:116:3880 blocked for more than 459 seconds. r10:829185c4 r9:e0775d84 r8:00000002 r7:60000113 r6:e0775d8c r5:8505b000 r5:8505b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8505b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2ef8c r4:84b2ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2ef8c r4:850c5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505b000 r8:850c542c r7:82804d40 r6:dddced40 r5:dddced60 r4:850c5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c5400 r8:8027ed34 r7:e0661e60 r6:850c5480 r5:8505b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0775fb0 to 0xe0775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850c8880 INFO: task kworker/0:116:3880 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 9d60: 800f0013 ffffffff r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829185c4 r9:e077dd84 r8:00000002 r7:60000013 r6:e077dd8c r5:8505d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8505d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2e78c r4:84b2e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2e78c r4:850c5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505d400 r8:850c552c r7:82804d40 r6:dddced40 r5:dddced60 r4:850c5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c5500 r8:8027ed34 r7:e0775e60 r6:850c5580 r5:8505d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe077dfb0 to 0xe077dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850c8880 INFO: task kworker/0:117:3881 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8783d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:3883 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e078dd84 r8:00000002 r7:60000113 r6:e078dd8c r5:8505c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e078de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0789000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502378c r4:85023400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502378c r4:850ad800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe078dfb0 to 0xe078dff8) r4:850bcd80 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:3884 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0791d84 r8:00000002 r7:60030113 r6:e0791d8c r5:8505ec00 r4:8505ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8505ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bcc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502338c r4:85023000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502338c r4:850ad780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505ec00 r8:850ad7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad780 r8:8027ed34 r7:e078de60 r6:850c5680 r5:8505ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0791fb0 to 0xe0791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850bcd80 INFO: task kworker/1:271:3884 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 87bc4000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:847c0000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85023f8c r4:85023c00 r10:00000000 r9:850ad880 r8:8027ed34 r7:e078de60 r6:850c5700 r5:847c0000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 87f05000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:118:3891 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:118 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:847c2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:3893 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07bdd84 r8:00000002 r7:60000013 r6:e07bdd8c r5:847c0c00 r4:847c0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2f78c r4:84b2f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 88d0b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:273 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:df98b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:3897 blocked for more than 459 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:847c5400 r4:847c5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d8380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028b8c r4:85028800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85028b8c r4:850ad980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c5400 r8:850ad9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ad980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ad980 r8:8027ed34 r7:e07a5e60 r6:850c5a00 r5:847c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c9fb0 to 0xe07c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b5f80 INFO: task kworker/1:274:3897 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 894fd000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e07d1d84 r8:00000002 r7:60000013 r6:e07d1d8c r5:847c4800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d80c0 INFO: task kworker/1:275:3901 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 894fd000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:276 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847c6c00 r8:850adaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850ada80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ada80 r8:8027ed34 r7:e07c9e60 r6:850c5b00 r5:847c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d82c0 INFO: task kworker/1:276:3903 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 89b43000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e079dd84 r8:00000002 r7:60000113 r6:e079dd8c r5:847c6000 r4:847c6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d8980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0145000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029f8c r4:85029c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85029f8c r4:850adb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:120 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d8480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85054800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028f8c r4:85028c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85028f8c r4:850c5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85054800 r8:850c5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850c5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c5c00 r8:8027ed34 r7:e07bde60 r6:850c5c80 r5:85054800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e1fb0 to 0xe07e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850dab40 INFO: task kworker/0:120:3909 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8a1b5000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:3910 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07e5d84 r8:00000002 r7:60000113 r6:e07e5d8c r5:85056c00 r4:85056c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85056c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85056c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b2ff8c r4:84b2fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8a69b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:122 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e9e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8a69b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:3913 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:84978c00 r4:84978c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:3914 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e07f5d84 r8:00000002 r7:60000013 r6:e07f5d8c r5:84979800 r4:84979800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84979800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f5e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d87c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84979800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502978c r4:85029400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502978c r4:850adc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84979800 r8:850adc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850adc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850adc00 r8:8027ed34 r7:e079de60 r6:850c5f80 r5:84979800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f5fb0 to 0xe07f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d8580 INFO: task kworker/1:279:3914 is blocked on a mutex likely owned by task kworker/1:130:3519. r4:00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 task:kworker/1:280 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029b8c r4:85029800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85029b8c r4:850adc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84978000 r8:850adcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850adc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850adc80 r8:8027ed34 r7:e079de60 r6:850db000 r5:84978000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d8580 INFO: task kworker/1:280:3916 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8b400000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:3920 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0801d84 r8:00000002 r7:60000113 r6:e0801d8c r5:8497b000 r4:8497b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0801e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c61c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8497b000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850db080 r8:8027ed34 r7:e07e5e60 r6:850db100 r5:8497b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:124:3921 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:124 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0805d84 r8:00000002 r7:60000113 r6:e0805d8c r5:8497a400 r4:8497a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0805e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8497a400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0713000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85100b8c r4:85100800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85100b8c r4:850db180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497a400 r8:850db1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850db180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:3922 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0809d84 r8:00000002 r7:60010113 r6:e0809d8c r5:8497bc00 r4:8497bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0809e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8497bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:00001000 r4:e04ea000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0809fb0 to 0xe0809ff8) r4:850c8300 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:3924 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:e0811d84 r8:00000002 r7:60000013 r6:e0811d8c r5:8497c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0811e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850add00 r8:8027ed34 r7:e079de60 r6:850db380 r5:8497c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:3926 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0819d84 r8:00000002 r7:60000113 r6:e0819d8c r5:8497ec00 r4:8497ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0819e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8502a38c r4:8502a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850d89c0 INFO: task kworker/1:282:3926 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8c036000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:283 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e016d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8c598000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:3932 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850adf00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8c8c5000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:3934 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0831d84 r8:00000002 r7:60000113 r6:e0831d8c r5:85075400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0831e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850d8f80 INFO: task kworker/1:285:3934 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8ca9e000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e0835d84 r8:00000002 r7:60000113 r6:e0835d8c r5:85078000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0835e08 r4:00000000 r5:00001000 r4:e01db000 r7:ddde2d40 r6:83018200 r5:8502b78c r4:850e5100 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126240 INFO: task kworker/1:286:3937 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8d101000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0839e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126080 INFO: task kworker/1:287:3938 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8d21a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 task:kworker/0:126 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0841e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8424778c r4:850db480 r10:00000000 r9:850db480 r8:8027ed34 r7:e0805e60 r6:850e5300 r5:8507b000 r4:851270c0 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d20: 8d21a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:3942 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0845d84 r8:00000002 r7:60000113 r6:e0845d8c r5:85079800 r4:85079800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0845e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e05d5000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502c38c r4:8502c000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502c38c r4:850e5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85079800 r8:850e53ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5380 r8:8027ed34 r7:e0839e60 r6:850e5400 r5:85079800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0845fb0 to 0xe0845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851265c0 INFO: task kworker/1:288:3942 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8d8e6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84adb38c r4:84adb000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8507bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e083de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8502c78c r4:850e5480 r4:850e5480 Exception stack(0xe083dfb0 to 0xe083dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85126940 INFO: task kworker/1:289:3944 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8d93d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:3946 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0825d84 r8:00000002 r7:60000113 r6:e0825d8c r5:8507c800 r4:8507c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502cb8c r4:8502c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502cb8c r4:850e5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507c800 r8:850e55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5580 r8:8027ed34 r7:e083de60 r6:850e5600 r5:8507c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0825fb0 to 0xe0825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126d40 INFO: task kworker/1:290:3946 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8e121000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:3948 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:8507d400 r4:8507d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0618000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502cf8c r4:8502cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502cf8c r4:850e5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:850e56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5680 r8:8027ed34 r7:e0825e60 r6:850e5700 r5:8507d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126bc0 INFO: task kworker/1:291:3948 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8e3b2000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8502d38c r4:8502d000 r10:00000000 r9:850e5780 r8:8027ed34 r7:e06b9e60 r6:850e5800 r5:8507e000 r4:85126dc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8e7d4000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850e5880 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe084dfb0 to 0xe084dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126ec0 INFO: task kworker/1:293:3952 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8ec27000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e085de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85073000 r8:850e59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe085dfb0 to 0xe085dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126fc0 INFO: task kworker/1:294:3954 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8ec27000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdffc9fb0 to 0xdffc9ff8) INFO: task kworker/1:295:3955 blocked for more than 460 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0879d84 r8:00000002 r7:60000013 r6:e0879d8c r5:85070000 r4:85070000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85070000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85070000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502db8c r4:8502d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e5a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:3958 blocked for more than 460 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0885d84 r8:00000002 r7:60000013 r6:e0885d8c r5:8507a400 r4:8507a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0885e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0887000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502e38c r4:8502e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502e38c r4:850e5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507a400 r8:850e5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: 8f44f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a1e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502eb8c r4:8502e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502eb8c r4:850e5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497e000 r8:850e5c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5c00 r8:8027ed34 r7:e0885e60 r6:850db580 r5:8497e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a1fb0 to 0xe08a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165240 INFO: task kworker/1:297:3960 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8fad8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0855e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502e78c r4:8502e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502e78c r4:850e5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85076c00 r8:850e5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5c80 r8:8027ed34 r7:e08a1e60 r6:850e5d00 r5:85076c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0855fb0 to 0xe0855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165240 INFO: task kworker/1:298:3961 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 8fad8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8502ef8c r4:8502ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85073c00 r8:850e5e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5e00 r8:8027ed34 r7:e08a1e60 r6:850e5d80 r5:85073c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0891fb0 to 0xe0891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851655c0 INFO: task kworker/1:299:3964 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9022b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:300:3965 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e087dd84 r8:00000002 r7:60000013 r6:e087dd8c r5:85080000 r4:85080000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85080000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e087de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85080000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08c3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502f38c r4:8502f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e5e80 dfa0: 00000000 00000000 00000000 00000000 r4:851655c0 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:3968 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e08e1d84 r8:00000002 r7:60000113 r6:e08e1d8c r5:847c3c00 r4:847c3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08d5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502f78c r4:8502f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:3970 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08e9e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85170080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:3971 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e08f5d84 r8:00000002 r7:60000113 r6:e08f5d8c r5:85130c00 r4:85130c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85130c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85130c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08eb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502fb8c r4:8502f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502fb8c r4:85170100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85130c00 r8:8517012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170100 r8:8027ed34 r7:e08e9e60 r6:850db700 r5:85130c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f5fb0 to 0xe08f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165a00 INFO: task kworker/1:303:3971 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84adb38c r4:84adb000 r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:304:3973 blocked for more than 461 seconds. r10:829185c4 r9:e4905d84 r8:00000002 r7:60000113 r6:e4905d8c r5:85132400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4905e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85132400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502ff8c r4:8502fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502ff8c r4:85170180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85132400 r8:851701ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170180 r8:8027ed34 r7:e08e9e60 r6:850db780 r5:85132400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4905fb0 to 0xe4905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165b40 INFO: task kworker/1:304:3973 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9112a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:e4911d84 r8:00000002 r7:60000013 r6:e4911d8c r5:85131800 r4:85131800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85131800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4911e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85131800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4901000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503438c r4:85034000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503438c r4:85170200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85131800 r8:8517022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170200 r8:8027ed34 r7:e08e9e60 r6:850db800 r5:85131800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4911fb0 to 0xe4911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165d00 INFO: task kworker/1:305:3975 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85133000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4937000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503478c r4:85034400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503478c r4:85170280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133000 r8:851702ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170280 r8:8027ed34 r7:e08e9e60 r6:850db880 r5:85133000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe493dfb0 to 0xe493dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85165e40 INFO: task kworker/1:306:3977 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 91935000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e494de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e4941000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85170300 r8:8027ed34 r7:e08e9e60 r6:850db900 r5:85133c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe494dfb0 to 0xe494dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85178280 INFO: task kworker/1:307:3979 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 91ce9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84aac340 task:kworker/1:308 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4961d84 r8:00000002 r7:60000113 r6:e4961d8c r5:85134800 r4:85134800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85134800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4961e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85134800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4973000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503578c r4:85035400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503578c r4:85170380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 91ce9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e496dd84 r8:00000002 r7:60000113 r6:e496dd8c r5:85135400 r4:85135400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85135400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e496de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85135400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e495d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503538c r4:85035000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503538c r4:85170480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85135400 r8:851704ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170480 r8:8027ed34 r7:e4961e60 r6:850dba00 r5:85135400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe496dfb0 to 0xe496dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851784c0 INFO: task kworker/1:309:3983 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:3985 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e497dd84 r8:00000002 r7:60000113 r6:e497dd8c r5:8497d400 r4:8497d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e497de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85170400 Exception stack(0xe497dfb0 to 0xe497dff8) r4:85178400 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:3987 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:3987 tgid:3987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8989d84 r8:00000002 r7:60000113 r6:e8989d8c r5:85136c00 r4:85136c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85136c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8989e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85136c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4979000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85035b8c r4:85035800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85035b8c r4:85170500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136c00 r8:8517052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9293f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:312 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8995e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85136000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e898d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85035f8c r4:85035c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85035f8c r4:85170580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136000 r8:851705ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170580 r8:8027ed34 r7:e497de60 r6:850dbb80 r5:85136000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8995fb0 to 0xe8995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 931e7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e899de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503678c r4:85036400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503678c r4:85170600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84270000 r8:8517062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170600 r8:8027ed34 r7:e497de60 r6:850dbc00 r5:84270000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe899dfb0 to 0xe899dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85178740 INFO: task kworker/1:313:3991 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 931e7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84adb38c r4:84adb000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 Workqueue: events bpf_prog_free_deferred r5:84271800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89b1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850dbc80 r8:8027ed34 r7:e0805e60 r6:850dbd00 r5:84271800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 93546000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:3996 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84272400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84272400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85036f8c r4:85036c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85036f8c r4:85170680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84272400 r8:851706ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170680 r8:8027ed34 r7:e899de60 r6:850dbd80 r5:84272400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:315 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8991e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84273000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfceb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503778c r4:85037400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503778c r4:85170700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84273000 r8:8517072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170700 r8:8027ed34 r7:e060de60 r6:850dbe00 r5:84273000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8991fb0 to 0xe8991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851789c0 INFO: task kworker/1:315:3998 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 93dd9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:128:4001 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:128 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e08b9d84 r8:00000002 r7:60000113 r6:e08b9d8c r5:84273c00 r4:84273c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe08b9fb0 to 0xe08b9ff8) r4:85189700 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e061dd84 r8:00000002 r7:60000013 r6:e061dd8c r5:84274800 r4:84274800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84274800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85178f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84274800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503738c r4:85037000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503738c r4:85170780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84274800 r8:851707ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170780 r8:8027ed34 r7:e8991e60 r6:850dbf80 r5:84274800 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:4004 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfeed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4007 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85170880 r8:8027ed34 r7:e0629e60 r6:8518b080 r5:84276000 r4:85178c40 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:4009 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:84276c00 r4:84276c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84276c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8519c78c r4:85170980 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85178740 INFO: task kworker/1:319:4009 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 94dbc000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffc9dc0 r5:00001000 r4:dfe09000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Not tainted 6.16.0-rc1-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85127200 INFO: task kworker/1:320:4011 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 95433000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4014 blocked for more than 461 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:85088000 r4:85088000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85088000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851842c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519cb8c r4:8519c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85088000 r8:85170aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85170a80 r8:8027ed34 r7:e06ede60 r6:8518b200 r5:85088000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184100 INFO: task kworker/1:321:4014 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d60: 800f0013 ffffffff r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:322 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519eb8c r4:8519e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519eb8c r4:85170b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508a400 r8:85170b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170b00 r8:8027ed34 r7:e0725e60 r6:8518b280 r5:8508a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe073dfb0 to 0xe073dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184100 INFO: task kworker/1:322:4016 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 959c6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0007000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519cf8c r4:8519cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519cf8c r4:85170b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508b000 r8:85170bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170b80 r8:8027ed34 r7:e073de60 r6:8518b300 r5:8508b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 95b74000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89bde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fa80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8508bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0703000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510078c r4:85100400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510078c r4:8518b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508bc00 r8:8518b3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518b380 r8:8027ed34 r7:e0805e60 r6:8518b400 r5:8508bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89bdfb0 to 0xe89bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f040 INFO: task kworker/0:129:4019 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 95d29000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89c1d84 r8:00000002 r7:60000113 r6:e89c1d8c r5:8508c800 r4:8508c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0015000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8519d38c r4:8519d000 r4:85170c00 Exception stack(0xe89c1fb0 to 0xe89c1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89c9d84 r8:00000002 r7:60000113 r6:e89c9d8c r5:85088c00 r4:85088c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85088c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851846c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0075000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519d78c r4:8519d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519d78c r4:85170c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088c00 r8:85170cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170c80 r8:8027ed34 r7:e073de60 r6:8518b500 r5:85088c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89c9fb0 to 0xe89c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851844c0 INFO: task kworker/1:325:4022 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 961b9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:326 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519db8c r4:8519d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519db8c r4:85170d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508e000 r8:85170d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170d00 r8:8027ed34 r7:e073de60 r6:8518b580 r5:8508e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d1fb0 to 0xe89d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184600 INFO: task kworker/1:326:4024 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89d9d84 r8:00000002 r7:60000113 r6:e89d9d8c r5:8508d400 r4:8508d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519df8c r4:8519dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519df8c r4:85170d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508d400 r8:85170dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170d80 r8:8027ed34 r7:e073de60 r6:8518b600 r5:8508d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d9fb0 to 0xe89d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184780 INFO: task kworker/1:327:4026 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:328:4028 blocked for more than 462 seconds. r4:85089800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89e1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0621000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519e38c r4:8519e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519e38c r4:85170e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85089800 r8:85170e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170e00 r8:8027ed34 r7:e073de60 r6:8518b680 r5:85089800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89e1fb0 to 0xe89e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184880 INFO: task kworker/1:328:4028 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 96a23000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4030 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89e9d84 r8:00000002 r7:60000113 r6:e89e9d8c r5:84960c00 r4:84960c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84960c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84960c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0649000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519e78c r4:8519e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519e78c r4:85170e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960c00 r8:85170eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170e80 r8:8027ed34 r7:e073de60 r6:8518b700 r5:84960c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89e9fb0 to 0xe89e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851849c0 INFO: task kworker/1:329:4030 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 97002000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:330 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0699000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519f38c r4:8519f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519f38c r4:85170f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84961800 r8:85170f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170f00 r8:8027ed34 r7:e073de60 r6:8518b780 r5:84961800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89f5fb0 to 0xe89f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184c80 INFO: task kworker/1:330:4033 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 97296000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:331:4036 blocked for more than 462 seconds. r10:829185c4 r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:84962400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84962400 r8:85170fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4037 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:84963c00 r4:84963c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84963c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dd700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0763000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a038c r4:851a0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851a038c r4:85170900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:8517092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85170900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85170900 r8:8027ed34 r7:e89f5e60 r6:8518b880 r5:84963c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85189e40 INFO: task kworker/1:332:4037 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 977a8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:333:4039 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa21d84 r8:00000002 r7:60000013 r6:eaa21d8c r5:84963000 r4:84963000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84963000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519f78c r4:8519f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519f78c r4:850e5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963000 r8:850e5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e5f80 r8:8027ed34 r7:eaa11e60 r6:8518b900 r5:84963000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85184fc0 INFO: task kworker/1:333:4039 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 97ab0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:4040 blocked for more than 462 seconds. task:kworker/1:334 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dd040 r9:83018205 r8:84964800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06df000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519fb8c r4:8519f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519fb8c r4:851df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84964800 r8:851df02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851df000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851df000 r8:8027ed34 r7:eaa11e60 r6:8518b980 r5:84964800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dd080 INFO: task kworker/1:334:4040 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84aac340 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85082400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0745000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519ff8c r4:8519fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519ff8c r4:851df080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85082400 r8:851df0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851df080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851df080 r8:8027ed34 r7:eaa11e60 r6:851df100 r5:85082400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dd080 INFO: task kworker/1:335:4042 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 980ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:85084800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85084800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85100f8c r4:85100c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85100f8c r4:8518ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85084800 r8:8518ba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ba00 r8:8027ed34 r7:e0805e60 r6:851df180 r5:85084800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f6c0 INFO: task kworker/0:130:4044 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 98150000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85085400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85101b8c r4:85101800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85101b8c r4:8518ba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85085400 r8:8518baac r7:82804d40 r6:dddced40 r5:dddced60 r4:8518ba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518ba80 r8:8027ed34 r7:eaa31e60 r6:851df200 r5:85085400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f580 INFO: task kworker/0:131:4047 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 985fe000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 r4:85083c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85083c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510178c r4:85101400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510178c r4:8518bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083c00 r8:8518bb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518bb00 r8:8027ed34 r7:eaa3de60 r6:851df280 r5:85083c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f580 INFO: task kworker/0:132:4048 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 98b83000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:84adb38c r4:84adb000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:336:4051 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:85083000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85083000 r8:851df32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:82abf1e4 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:4053 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa29d84 r8:00000002 r7:60000013 r6:eaa29d8c r5:85086c00 r4:85086c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85086c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ddb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85086c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0787000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a0f8c r4:851a0c00 r7:ddde2d40 r6:83018200 r5:851a0f8c r4:851df400 Exception stack(0xeaa29fb0 to 0xeaa29ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4055 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0701d84 r8:00000002 r7:60000113 r6:e0701d8c r5:85086000 r4:85086000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85086000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dda40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85086000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077f000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 99612000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851df600 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:4059 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa49d84 r8:00000002 r7:60000013 r6:eaa49d8c r5:85081800 r4:85081800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85081800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dde00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85081800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a178c r4:851a1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851a178c r4:851df700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85081800 r8:851df72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851df700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:341:4061 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:847c3000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:851a1f8c r4:851df800 r10:61c88647 r9:847c3000 r8:851df82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851dde40 INFO: task kworker/1:341:4061 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9a3a7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4063 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ddf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85090000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89b9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9a783000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4067 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:85091800 r4:85091800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85091800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85091800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a278c r4:851a2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851a278c r4:851dfb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85091800 r8:851dfb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dfb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dfb00 r8:8027ed34 r7:eaa55e60 r6:851dfb80 r5:85091800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e1100 INFO: task kworker/1:344:4067 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9af61000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85092400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08d9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851a2b8c r4:851a2800 r10:00000000 r9:851dfc00 r8:8027ed34 r7:eaa59e60 r6:851dfc80 r5:85092400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9b2eb000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:e08e5d84 r8:00000002 r7:60000013 r6:e08e5d8c r5:85093000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1500 r7:ddde2d40 r6:83018200 r5:851a2f8c r4:851dfd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093000 r8:851dfd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dfd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dfd00 r8:8027ed34 r7:e08d9e60 r6:851dfd80 r5:85093000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08e5fb0 to 0xe08e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e13c0 INFO: task kworker/1:346:4071 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9b2eb000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 r5:84adb38c r4:84adb000 r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4073 blocked for more than 462 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e08f9d84 r8:00000002 r7:60000113 r6:e08f9d8c r5:85093c00 r4:85093c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85093c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e13c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85093c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85093c00 r8:851dfe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85094800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a378c r4:851a3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851a378c r4:851dff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85094800 r8:851dff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dff00 r8:8027ed34 r7:e08f9e60 r6:851dff80 r5:85094800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08fdfb0 to 0xe08fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e1740 INFO: task kworker/1:348:4075 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9bc16000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e1a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85095400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a3b8c r4:851a3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851a3b8c r4:851f4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85095400 r8:851f402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:851f4000 r8:8027ed34 r7:e08fde60 r6:851f4080 r5:85095400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9be8a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:4078 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4945d84 r8:00000002 r7:60000113 r6:e4945d8c r5:85096c00 r4:85096c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4945e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851b0b8c r4:851b0800 r10:00000000 r9:851f4100 r8:8027ed34 r7:e4909e60 r6:851f4180 r5:85096c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:dffc9dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4080 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4965d84 r8:00000002 r7:60000113 r6:e4965d8c r5:85098000 r4:85098000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85098000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4965e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed080 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85098000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e016f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9c414000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:4083 blocked for more than 463 seconds. r10:829185c4 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:8509a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8510238c r4:85102000 r4:8518bb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:4084 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4935d84 r8:00000002 r7:60000113 r6:e4935d8c r5:84960000 r4:84960000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84960000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4935e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0133000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85101f8c r4:85101c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85101f8c r4:8518bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960000 r8:8518bc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518bc00 r8:8027ed34 r7:eaa6de60 r6:8518bc80 r5:84960000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4935fb0 to 0xe4935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9800 INFO: task kworker/0:134:4084 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:4088 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa69d84 r8:00000002 r7:60000113 r6:eaa69d8c r5:84966c00 r4:84966c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84966c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85102b8c r4:85102800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85102b8c r4:8518bd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966c00 r8:8518bd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518bd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518bd00 r8:8027ed34 r7:eaa6de60 r6:8518bd80 r5:84966c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9bc0 INFO: task kworker/0:135:4088 is blocked on a mutex likely owned by task kworker/1:130:3519. r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 INFO: task kworker/0:136:4089 blocked for more than 463 seconds. r10:829185c4 r9:e8985d84 r8:00000002 r7:60000113 r6:e8985d8c r5:84966000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8985e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0199000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510278c r4:85102400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510278c r4:8518be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:8518be2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518be00 r8:8027ed34 r7:eaa69e60 r6:8518be80 r5:84966000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8985fb0 to 0xe8985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9bc0 INFO: task kworker/0:136:4089 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:137 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8510338c r4:8518bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84965400 r8:8518bf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8518bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8518bf00 r8:8027ed34 r7:eaa69e60 r6:8518bf80 r5:84965400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9dc0 INFO: task kworker/0:137:4092 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9d307000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:138:4094 blocked for more than 463 seconds. r10:829185c4 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:8508ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f75c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8508ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07db000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85102f8c r4:85102c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85102f8c r4:851eb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508ec00 r8:851eb02c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eb000 r8:8027ed34 r7:eaa79e60 r6:851eb080 r5:8508ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9dc0 INFO: task kworker/0:138:4094 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9d307000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4095 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:85148000 r4:85148000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85148000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85148000 r8:851f43ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9d695000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4098 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed440 r5:851b078c r4:851b0400 r10:00000000 r9:851f4400 r8:8027ed34 r7:e4945e60 r6:851eb180 r5:85148c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4100 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:8514b000 r4:8514b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0749000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b178c r4:851b1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b178c r4:851f4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514b000 r8:851f44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4480 r8:8027ed34 r7:e4945e60 r6:851eb200 r5:8514b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ed500 INFO: task kworker/1:354:4100 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9db21000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4101 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa99d84 r8:00000002 r7:60000013 r6:eaa99d8c r5:85149800 r4:85149800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85149800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85149800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0604000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:851f4500 r8:8027ed34 r7:eaa95e60 r6:851eb280 r5:85149800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ed700 INFO: task kworker/1:355:4101 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9dfdf000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4103 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:8514a400 r4:8514a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b138c r4:851b1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b138c r4:851f4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:851f45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4580 r8:8027ed34 r7:eaa95e60 r6:851eb300 r5:8514a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84adb38c r4:84adb000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4105 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8514bc00 r4:8514bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ede80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0815000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b238c r4:851b2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b238c r4:851f4600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:851f462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4600 r8:8027ed34 r7:eaa95e60 r6:851eb380 r5:8514bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ed880 INFO: task kworker/1:357:4105 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9e6e3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4107 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8514c800 r4:8514c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8514c800 r8:851f46ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9e9dc000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851eb480 Exception stack(0xeaa7dfb0 to 0xeaa7dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 9d20: 9ed66000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4111 blocked for more than 463 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b1f8c r4:851b1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b1f8c r4:851f4700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514ec00 r8:851f472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4700 r8:8027ed34 r7:eaaa9e60 r6:851eb580 r5:8514ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab5fb0 to 0xeaab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851edc40 INFO: task kworker/1:359:4111 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9f0ce000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:4114 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:8514d400 r4:8514d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e08c5000 r10:61c88647 r9:8514d400 r8:851eb62c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:140:4114 is blocked on a mutex likely owned by task kworker/1:130:3519. r4:00000000 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4117 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:84980c00 r4:84980c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84980c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851edf80 r4:00000000 r9:83018205 r8:84980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84980c00 r8:851f47ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdffc9d20 to 0xdffc9d68) r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 r5:00001000 r4:dfe09000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4118 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:84981800 r4:84981800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84981800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84981800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0867000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b2b8c r4:851b2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b2b8c r4:851f4800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84981800 r8:851f482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4800 r8:8027ed34 r7:eaabde60 r6:851eb780 r5:84981800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851edf00 INFO: task kworker/1:361:4118 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9f97c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4120 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:84983000 r4:84983000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84983000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ee1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84983000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e088b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b338c r4:851b3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b338c r4:851f4880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983000 r8:851f48ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4880 r8:8027ed34 r7:eaac1e60 r6:851eb800 r5:84983000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9100 INFO: task kworker/1:362:4120 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9f97c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4121 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:8509bc00 r4:8509bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8509bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ee040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e087f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b2f8c r4:851b2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b2f8c r4:851f4900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509bc00 r8:851f492c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4900 r8:8027ed34 r7:eaac9e60 r6:851f4980 r5:8509bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee000 INFO: task kworker/1:363:4121 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: 9ff25000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4124 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaacdd84 r8:00000002 r7:60000013 r6:eaacdd8c r5:8509c800 r4:8509c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ee280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b378c r4:851b3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b378c r4:851f4a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509c800 r8:851f4a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4a00 r8:8027ed34 r7:eaac9e60 r6:851f4a80 r5:8509c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee180 INFO: task kworker/1:364:4124 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a0219000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:8509d400 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:e08b3000 r5:851b3b8c r4:851b3800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee2c0 INFO: task kworker/1:365:4126 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a0219000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4127 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:8509ec00 r4:8509ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8509ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ee880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e490b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b3f8c r4:851b3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b3f8c r4:851f4c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:851f4c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4c00 r8:8027ed34 r7:eaad1e60 r6:851f4c80 r5:8509ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee3c0 INFO: task kworker/1:366:4127 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a05d8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4129 blocked for more than 463 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaab9d84 r8:00000002 r7:60000013 r6:eaab9d8c r5:84984800 r4:84984800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84984800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eeb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84984800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b4b8c r4:851b4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b4b8c r4:851f4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84984800 r8:851f4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f4d00 r8:8027ed34 r7:eaad9e60 r6:851eb880 r5:84984800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee3c0 INFO: task kworker/1:367:4129 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a087b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:4132 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:84983c00 r4:84983c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84983c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85103b8c r4:85103800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85103b8c r4:851eb900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983c00 r8:851eb92c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eb900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eb900 r8:8027ed34 r7:eaa7de60 r6:851eb980 r5:84983c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7440 INFO: task kworker/0:141:4132 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a0d02000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:4134 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:84985400 r4:84985400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84985400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ff040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84985400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0781000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b938c r4:851b9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b938c r4:851eba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84985400 r8:851eba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eba00 r8:8027ed34 r7:eaa7de60 r6:851eba80 r5:84985400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7b80 INFO: task kworker/0:142:4134 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:368:4136 blocked for more than 464 seconds. r4:84986000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84986000 r8:851fb22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4137 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89d5d84 r8:00000002 r7:60000113 r6:e89d5d8c r5:84986c00 r4:84986c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84986c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eeb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa01000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b478c r4:851b4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b478c r4:851fb280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84986c00 r8:851fb2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb280 r8:8027ed34 r7:eaab9e60 r6:851ebb80 r5:84986c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d5fb0 to 0xe89d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee7c0 INFO: task kworker/1:369:4137 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a155c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adb38c r4:84adb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:370 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b4f8c r4:851b4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b4f8c r4:851fb300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:851fb32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb300 r8:8027ed34 r7:eaab9e60 r6:851ebc00 r5:85150000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eec40 INFO: task kworker/1:370:4140 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a184d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4142 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:85150c00 r4:85150c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85150c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851edd80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b578c r4:851b5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b578c r4:851fb380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150c00 r8:851fb3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb380 r8:8027ed34 r7:eaa05e60 r6:851ebc80 r5:85150c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eecc0 INFO: task kworker/1:371:4142 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r5:800f0013 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:372 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfd8f000 r7:ddde2d40 r6:83018200 r5:851b538c r4:851fb400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb400 r8:8027ed34 r7:eaa15e60 r6:851ebd00 r5:85151800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eecc0 INFO: task kworker/1:372:4143 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a1def000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4146 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:373 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:374:4147 blocked for more than 464 seconds. r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:85153000 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dff41000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b5b8c r4:851b5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b5b8c r4:851fb500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153000 r8:851fb52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb500 r8:8027ed34 r7:eaae5e60 r6:851ebe00 r5:85153000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eec40 INFO: task kworker/1:374:4147 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a21ac000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4150 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851fb580 r8:8027ed34 r7:eaae5e60 r6:851ebe80 r5:85155400 r4:851fa000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4151 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:85153c00 r4:85153c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85153c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85153c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b678c r4:851b6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b678c r4:851fb680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153c00 r8:851fb6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb680 r8:8027ed34 r7:eaafde60 r6:851ebf00 r5:85153c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/1:376:4151 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a289c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:377 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:851fb600 r8:8027ed34 r7:eab01e60 r6:851ebf80 r5:85154800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:4155 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:85156000 r4:85156000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85156000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85156000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0509000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b6b8c r4:851b6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b6b8c r4:851fb700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156000 r8:851fb72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:379:4157 blocked for more than 464 seconds. r10:829185c4 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:84982400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 r5:851b738c r4:851b7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:4159 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab29d84 r8:00000002 r7:60000013 r6:eab29d8c r5:84980000 r4:84980000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84980000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84980000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b778c r4:851b7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b778c r4:851fb880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84980000 r8:851fb8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb880 r8:8027ed34 r7:eab21e60 r6:851f4e80 r5:84980000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa500 INFO: task kworker/1:380:4159 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eab31d84 r8:00000002 r7:60000013 r6:eab31d8c r5:85158c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85158c00 r8:851fb82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4165 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab35d84 r8:00000002 r7:60000013 r6:eab35d8c r5:8515a400 r4:8515a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851faa80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b7f8c r4:851b7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b7f8c r4:851fb900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515a400 r8:851fb92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb900 r8:8027ed34 r7:eab31e60 r6:851f4f00 r5:8515a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa980 INFO: task kworker/1:382:4165 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:383 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4168 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab2dd84 r8:00000002 r7:60000113 r6:eab2dd8c r5:8509b000 r4:8509b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8509b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fac00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b838c r4:851b8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b838c r4:851fba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509b000 r8:851fba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fba00 r8:8027ed34 r7:eab3de60 r6:851fba80 r5:8509b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851faac0 INFO: task kworker/1:384:4168 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a3f86000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4172 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e89e5d84 r8:00000002 r7:60000113 r6:e89e5d8c r5:8509e000 r4:8509e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8509e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851faf80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8509e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b8b8c r4:851b8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b8b8c r4:851fbc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509e000 r8:851fbc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fbc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fbc00 r8:8027ed34 r7:eab3de60 r6:851fbc80 r5:8509e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89e5fb0 to 0xe89e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ee640 INFO: task kworker/1:386:4172 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a4447000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4174 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:850a0000 r4:850a0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c6500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0769000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b8f8c r4:851b8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b8f8c r4:851fbd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0000 r8:851fbd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fbd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fbd00 r8:8027ed34 r7:eab3de60 r6:851fbd80 r5:850a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c65c0 INFO: task kworker/1:387:4174 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a4675000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4176 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4176 tgid:4176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab49d84 r8:00000002 r7:60000013 r6:eab49d8c r5:850a0c00 r4:850a0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b9b8c r4:851b9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b9b8c r4:851fbe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0c00 r8:851fbe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fbe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fbe00 r8:8027ed34 r7:eab3de60 r6:851fbe80 r5:850a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851faf40 INFO: task kworker/1:388:4176 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a4844000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4180 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:850a3000 r4:850a3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4967000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ba38c r4:851ba000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ba38c r4:851fbf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3000 r8:851fbf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fbf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fbf00 r8:8027ed34 r7:eab49e60 r6:851fbf80 r5:850a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215440 INFO: task kworker/1:389:4180 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a4e80000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:4182 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:8515c800 r4:8515c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c6600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4947000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492878c r4:84928400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492878c r4:85213080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515c800 r8:852130ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85213080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213080 r8:8027ed34 r7:eaa7de60 r6:85213100 r5:8515c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ff0c0 INFO: task kworker/0:143:4182 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a5054000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4184 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000013 r6:eab4dd8c r5:8515d400 r4:8515d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515d400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4955000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b9f8c r4:851b9c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b9f8c r4:851fb180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515d400 r8:851fb1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb180 r8:8027ed34 r7:eab51e60 r6:85213180 r5:8515d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215700 INFO: task kworker/1:390:4184 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a5054000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:4186 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:8515ec00 r4:8515ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492838c r4:84928000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492838c r4:85213200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515ec00 r8:8521322c r7:82804d40 r6:dddced40 r5:dddced60 r4:85213200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213200 r8:8027ed34 r7:eaa7de60 r6:85213280 r5:8515ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85216000 INFO: task kworker/0:144:4186 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a56a8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:4187 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:8515b000 r4:8515b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4971000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ba78c r4:851ba400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ba78c r4:851fb100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515b000 r8:851fb12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb100 r8:8027ed34 r7:eab51e60 r6:85213300 r5:8515b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215840 INFO: task kworker/1:391:4187 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a5ae8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4189 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:85158000 r4:85158000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85158000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85158000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8999000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851baf8c r4:851bac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851baf8c r4:851fb080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85158000 r8:851fb0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb080 r8:8027ed34 r7:eab61e60 r6:85213380 r5:85158000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215900 INFO: task kworker/1:392:4189 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a5ae8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4192 blocked for more than 464 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab75d84 r8:00000002 r7:60000113 r6:eab75d8c r5:8515bc00 r4:8515bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8981000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bab8c r4:851ba800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bab8c r4:851fb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515bc00 r8:851fb02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851fb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fb000 r8:8027ed34 r7:eab69e60 r6:85213400 r5:8515bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215a80 INFO: task kworker/1:393:4192 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a5ec8000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4193 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:85156c00 r4:85156c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85156c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85156c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bb78c r4:851bb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bb78c r4:85211000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156c00 r8:8521102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211000 r8:8027ed34 r7:eab69e60 r6:85213480 r5:85156c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215a80 INFO: task kworker/1:394:4193 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a62a1000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:4194 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:8515e000 r4:8515e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8515e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bb38c r4:851bb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bb38c r4:85211080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515e000 r8:852110ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211080 r8:8027ed34 r7:eab79e60 r6:85213500 r5:8515e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215d00 INFO: task kworker/1:395:4194 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a667e000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4197 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:849c0c00 r4:849c0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bc38c r4:851bc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bc38c r4:85211100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:8521112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211100 r8:8027ed34 r7:eab79e60 r6:85213580 r5:849c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215e40 INFO: task kworker/1:396:4197 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a6c84000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4198 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:849c1800 r4:849c1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852155c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bbb8c r4:851bb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bbb8c r4:85211180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:852111ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211180 r8:8027ed34 r7:eab81e60 r6:85213600 r5:849c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215ec0 INFO: task kworker/1:397:4198 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a7081000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4200 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000013 r6:eab8dd8c r5:849c0000 r4:849c0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bbf8c r4:851bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bbf8c r4:85211200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:8521122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211200 r8:8027ed34 r7:eab81e60 r6:85213680 r5:849c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253080 INFO: task kworker/1:398:4200 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a72b9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4203 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:849c4800 r4:849c4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852533c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bcb8c r4:851bc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bcb8c r4:85211280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c4800 r8:852112ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211280 r8:8027ed34 r7:eab81e60 r6:85213700 r5:849c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852532c0 INFO: task kworker/1:399:4203 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a7663000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4204 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:849c3000 r4:849c3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bc78c r4:851bc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bc78c r4:85211300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:8521132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211300 r8:8027ed34 r7:eab99e60 r6:85213780 r5:849c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852532c0 INFO: task kworker/1:400:4204 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a79fc000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4206 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:849c3c00 r4:849c3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852538c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0197000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bd78c r4:851bd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bd78c r4:85211380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:852113ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211380 r8:8027ed34 r7:eab99e60 r6:85213800 r5:849c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253240 INFO: task kworker/1:401:4206 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a80b9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4208 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:849c2400 r4:849c2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bcf8c r4:851bcc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bcf8c r4:85211400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c2400 r8:8521142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211400 r8:8027ed34 r7:eaba9e60 r6:85213880 r5:849c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253400 INFO: task kworker/1:402:4208 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a839f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4212 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab71d84 r8:00000002 r7:60000013 r6:eab71d8c r5:849c6000 r4:849c6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0163000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bd38c r4:851bd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bd38c r4:85211480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6000 r8:852114ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211480 r8:8027ed34 r7:eaba9e60 r6:85213900 r5:849c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253700 INFO: task kworker/1:403:4212 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a842f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4213 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:849c6c00 r4:849c6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bdb8c r4:851bd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bdb8c r4:85211500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:8521152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211500 r8:8027ed34 r7:eaba9e60 r6:85213980 r5:849c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253540 INFO: task kworker/1:404:4213 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a8bee000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4216 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:85290c00 r4:85290c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85290c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851be38c r4:851be000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851be38c r4:85211580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290c00 r8:852115ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211580 r8:8027ed34 r7:eabb5e60 r6:85213a00 r5:85290c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253bc0 INFO: task kworker/1:405:4216 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a8f96000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:4217 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85291800 r4:85291800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85291800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85291800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bdf8c r4:851bdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bdf8c r4:85211600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85291800 r8:8521162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211600 r8:8027ed34 r7:eabc1e60 r6:85213a80 r5:85291800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253bc0 INFO: task kworker/1:406:4217 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a8f96000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4219 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:85293000 r4:85293000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85293000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851beb8c r4:851be800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851beb8c r4:85211680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293000 r8:852116ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211680 r8:8027ed34 r7:eabc1e60 r6:85213b00 r5:85293000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253980 INFO: task kworker/1:407:4219 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a9709000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4221 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:85292400 r4:85292400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85292400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85253d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85292400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061a000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851be78c r4:851be400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851be78c r4:85211700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85292400 r8:8521172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211700 r8:8027ed34 r7:eabcde60 r6:85213b80 r5:85292400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253b80 INFO: task kworker/1:408:4221 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a9709000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4223 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabddd84 r8:00000002 r7:60000013 r6:eabddd8c r5:85293c00 r4:85293c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85293c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0813000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bf38c r4:851bf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bf38c r4:85211780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293c00 r8:852117ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211780 r8:8027ed34 r7:eabcde60 r6:85213c00 r5:85293c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253d40 INFO: task kworker/1:409:4223 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: a9e78000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4225 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:85294800 r4:85294800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85294800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852161c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85294800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bef8c r4:851bec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bef8c r4:85211800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85294800 r8:8521182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211800 r8:8027ed34 r7:eabdde60 r6:85213c80 r5:85294800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253e80 INFO: task kworker/1:410:4225 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: aa04d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:4226 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:85295400 r4:85295400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85295400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85295400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c038c r4:851c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c038c r4:85211880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85295400 r8:852118ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211880 r8:8027ed34 r7:eabdde60 r6:85213d00 r5:85295400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852163c0 INFO: task kworker/1:411:4226 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: aa43b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4229 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:85296c00 r4:85296c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85296c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85296c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d138c r4:852d1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d138c r4:85213d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296c00 r8:85213dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85213d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213d80 r8:8027ed34 r7:eaa7de60 r6:85213e00 r5:85296c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852686c0 INFO: task kworker/0:145:4229 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: aa7fd000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:4232 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabadd84 r8:00000002 r7:60000113 r6:eabadd8c r5:85296000 r4:85296000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85296000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85296000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0871000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d078c r4:852d0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d078c r4:85213e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296000 r8:85213eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85213e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85213e80 r8:8027ed34 r7:eabe9e60 r6:85213f00 r5:85296000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268800 INFO: task kworker/0:146:4232 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: aaacd000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4233 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:85290000 r4:85290000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85290000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bf78c r4:851bf400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bf78c r4:85211900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290000 r8:8521192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211900 r8:8027ed34 r7:eabede60 r6:85213f80 r5:85290000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85253f80 INFO: task kworker/1:412:4233 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ab05f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:4235 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:849c5400 r4:849c5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0b8c r4:8526c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:8526c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8526c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526c000 r8:8027ed34 r7:eabe9e60 r6:8526c080 r5:849c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268a40 INFO: task kworker/0:147:4235 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ab05f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4237 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:84818000 r4:84818000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84818000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bfb8c r4:851bf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bfb8c r4:85211980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818000 r8:852119ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211980 r8:8027ed34 r7:eabede60 r6:8526c100 r5:84818000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263100 INFO: task kworker/1:413:4237 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ab492000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:4239 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf5d84 r8:00000002 r7:60000013 r6:eabf5d8c r5:84818c00 r4:84818c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85268fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0f8c r4:852d0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0f8c r4:8526c180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818c00 r8:8526c1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8526c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526c180 r8:8027ed34 r7:eabe9e60 r6:8526c200 r5:84818c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268c80 INFO: task kworker/0:148:4239 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ab492000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4241 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac01d84 r8:00000002 r7:60000113 r6:eac01d8c r5:84819800 r4:84819800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84819800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84819800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bff8c r4:851bfc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851bff8c r4:85211a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84819800 r8:85211a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211a00 r8:8027ed34 r7:eabede60 r6:8526c280 r5:84819800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac01fb0 to 0xeac01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263040 INFO: task kworker/1:414:4241 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ab909000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4243 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:8481a400 r4:8481a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481a400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c0b8c r4:851c0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c0b8c r4:85211a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481a400 r8:85211aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211a80 r8:8027ed34 r7:eabede60 r6:8526c300 r5:8481a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852634c0 INFO: task kworker/1:415:4243 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: abd3c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:4246 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:8481b000 r4:8481b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1b8c r4:852d1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d1b8c r4:8526c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481b000 r8:8526c3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8526c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526c380 r8:8027ed34 r7:eabe9e60 r6:8526c400 r5:8481b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268400 INFO: task kworker/0:149:4246 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: abd3c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4248 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8481bc00 r4:8481bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c078c r4:851c0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c078c r4:85211b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481bc00 r8:85211b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211b00 r8:8027ed34 r7:eac05e60 r6:8526c480 r5:8481bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263600 INFO: task kworker/1:416:4248 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ac0a3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4249 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8481c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2b8c r4:852d2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2b8c r4:8526c500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481c800 r8:8526c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8526c500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526c500 r8:8027ed34 r7:eabfde60 r6:8526c580 r5:8481c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85268000 INFO: task kworker/0:150:4249 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ac0a3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c0f8c r4:851c0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c0f8c r4:85211c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481ec00 r8:85211c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211c00 r8:8027ed34 r7:eac05e60 r6:8526c600 r5:8481ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263ac0 INFO: task kworker/1:417:4252 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ac466000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:84adb38c r4:84adb000 r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:418 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263ec0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c1b8c r4:851c1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c1b8c r4:85211b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:85211bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211b80 r8:8027ed34 r7:eac1de60 r6:8526c680 r5:85228000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263ac0 INFO: task kworker/1:418:4254 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 Exception stack(0xdffc9d20 to 0xdffc9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:419 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c138c r4:851c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c138c r4:85211c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228c00 r8:85211cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211c80 r8:8027ed34 r7:eac25e60 r6:8526c700 r5:85228c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263ac0 INFO: task kworker/1:419:4255 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85263c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9df000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c178c r4:851c1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c178c r4:85211d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:85211d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211d00 r8:8027ed34 r7:eac25e60 r6:8526c780 r5:8522a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263d80 INFO: task kworker/1:420:4257 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred 9d20: acb0e000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8522bc00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c1f8c r4:851c1c00 r10:00000000 r9:85211d80 r8:8027ed34 r7:eac25e60 r6:8526c800 r5:8522bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263e80 INFO: task kworker/1:421:4262 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: acfa5000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4264 blocked for more than 465 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:8522d400 r4:8522d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852636c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8522d400 r8:85211e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85271000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0543000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c2b8c r4:851c2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c2b8c r4:85211e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:85211eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211e80 r8:8027ed34 r7:eac31e60 r6:8526c900 r5:8522e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85263640 INFO: task kworker/1:423:4266 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:151 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89c3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1f8c r4:852d1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d1f8c r4:8526c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522ec00 r8:8526c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8526c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526c980 r8:8027ed34 r7:eac11e60 r6:8526ca00 r5:8522ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8526acc0 INFO: task kworker/0:151:4267 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ad796000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84adb38c r4:84adb000 r4:00000001 r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:8522c800 r4:8522c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c6580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522c800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c278c r4:851c2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c278c r4:85211f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522c800 r8:85211f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211f00 r8:8027ed34 r7:eac39e60 r6:8526ca80 r5:8522c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 800f0013 ffffffff r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4271 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:8481d400 r4:8481d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85271700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0733000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c3f8c r4:851c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c3f8c r4:85211f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481d400 r8:85211fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85211f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85211f80 r8:8027ed34 r7:eac39e60 r6:8526cb00 r5:8481d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271100 INFO: task kworker/1:425:4271 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: added000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84adb38c r4:84adb000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271300 INFO: task kworker/1:426:4272 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ae0aa000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85230000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c338c r4:851c3000 r10:00000000 r9:85270080 r8:8027ed34 r7:eac4de60 r6:8526cc00 r5:85230000 Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271140 INFO: task kworker/1:427:4274 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ae464000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4277 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:85232400 r4:85232400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85232400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c378c r4:851c3400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85232400 r8:8527012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270100 r8:8027ed34 r7:eac4de60 r6:8526cc80 r5:85232400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac65fb0 to 0xeac65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271200 INFO: task kworker/1:428:4277 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: aea61000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:4278 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:850a6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c3b8c r4:851c3800 r4:85270180 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: aea61000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4281 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:850a6000 r4:850a6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85271a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c478c r4:851c4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c478c r4:85270280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:852702ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270280 r8:8027ed34 r7:eac4de60 r6:85270300 r5:850a6000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4282 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:850a5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85271800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c438c r4:851c4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c438c r4:85270380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a5400 r8:852703ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270380 r8:8027ed34 r7:eac61e60 r6:85270400 r5:850a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852716c0 INFO: task kworker/1:431:4282 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e4959000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c538c r4:851c5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c538c r4:85270480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a4800 r8:852704ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270480 r8:8027ed34 r7:eac61e60 r6:85270500 r5:850a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271c00 INFO: task kworker/1:432:4285 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: af236000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:433 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c4b8c r4:851c4800 r4:85270580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270580 r8:8027ed34 r7:eac71e60 r6:85270600 r5:850a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271b40 INFO: task kworker/1:433:4287 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: af460000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aac340 task:kworker/1:434 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c4f8c r4:851c4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4f8c r4:85270680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3c00 r8:852706ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270680 r8:8027ed34 r7:eac71e60 r6:85270780 r5:850a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85271c80 INFO: task kworker/1:434:4289 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: afa50000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4291 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:850a1800 r4:850a1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85271fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85270800 r8:8027ed34 r7:eac71e60 r6:85270880 r5:850a1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4293 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:85099800 r4:85099800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85099800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e898b000 r10:61c88647 r9:85099800 r8:8527072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Exception stack(0xdffc9fb0 to 0xdffc9ff8) Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eac85d84 r8:00000002 r7:60000013 r6:eac85d8c r5:85096000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5f8c r4:851c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5f8c r4:85270980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096000 r8:852709ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270980 r8:8027ed34 r7:eac81e60 r6:85270a00 r5:85096000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85289140 INFO: task kworker/1:437:4295 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b036b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85298000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85298000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c778c r4:851c7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c778c r4:85270a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85298000 r8:85270aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270a80 r8:8027ed34 r7:eac85e60 r6:85270b00 r5:85298000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852891c0 INFO: task kworker/1:438:4297 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b0550000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Workqueue: events bpf_prog_free_deferred r5:85298c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c678c r4:851c6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c678c r4:85270b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85298c00 r8:85270bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270b80 r8:8027ed34 r7:eac89e60 r6:85270c00 r5:85298c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852891c0 INFO: task kworker/1:439:4298 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852864c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8529a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c638c r4:851c6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851c638c r4:8526cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529a400 r8:8526cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8526cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526cd00 r8:8027ed34 r7:eac11e60 r6:85270c80 r5:8529a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852864c0 INFO: task kworker/0:152:4300 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d20: b0eed000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852866c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85299800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6f8c r4:851c6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851c6f8c r4:8526cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85299800 r8:8526cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8526cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8526cd80 r8:8027ed34 r7:eac11e60 r6:85270d80 r5:85299800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85286440 INFO: task kworker/0:153:4302 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 9d20: b0eed000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:440:4305 blocked for more than 466 seconds. [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852899c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8529b000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6b8c r4:851c6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c6b8c r4:85270e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529b000 r8:85270e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270e00 r8:8027ed34 r7:eac89e60 r6:85270e80 r5:8529b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 task:kworker/1:441 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85230c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c738c r4:851c7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c738c r4:85270f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230c00 r8:85270fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85270f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85270f80 r8:8027ed34 r7:eac89e60 r6:8526ce00 r5:85230c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85289b80 INFO: task kworker/1:441:4308 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:154:4309 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:85233c00 r4:85233c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85233c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85233c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d238c r4:8526ce80 r4:8526ce80 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4310 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000013 r6:eaca9d8c r5:85234800 r4:85234800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eacb1000 r7:ddde2d40 r6:83018200 r5:851c7f8c r4:85270f00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfe09000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4312 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacadd84 r8:00000002 r7:60000013 r6:eacadd8c r5:85235400 r4:85235400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85235400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85235400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c7b8c r4:851c7800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c7b8c r4:85270d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85270d00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b1b48000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:84adb38c r4:84adb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534538c r4:85345000 r10:00000000 r9:85308080 r8:8027ed34 r7:eac11e60 r6:85308100 r5:85236000 r4:85286b00 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4316 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4316 tgid:4316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:85236c00 r4:85236c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eacbb000 r10:61c88647 r9:85236c00 r8:8530302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85289ac0 INFO: task kworker/1:444:4316 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b20a6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:84adb38c r4:84adb000 r4:84a92780 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:445:4319 blocked for more than 466 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300300 r7:ddde2d40 r6:83018200 r5:85340b8c r4:85303080 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b24f3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4322 blocked for more than 466 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:85229800 r4:85229800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85229800 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534078c r4:85340400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534078c r4:85303100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85229800 r8:8530312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303100 r8:8027ed34 r7:eacc5e60 r6:85308280 r5:85229800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84adb38c r4:84adb000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85340f8c r4:85340c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85340f8c r4:85303180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522b000 r8:853031ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303180 r8:8027ed34 r7:eacc5e60 r6:85308300 r5:8522b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300280 INFO: task kworker/1:447:4323 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 9d20: b27b3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:448 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000013 r6:eacf1d8c r5:849a0c00 r4:849a0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85341b8c r4:85341800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85341b8c r4:85303200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0c00 r8:8530322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85303200 r8:8027ed34 r7:eacdde60 r6:85308380 r5:849a0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4326 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf5d84 r8:00000002 r7:60000013 r6:eacf5d8c r5:849a1800 r4:849a1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:449:4326 is blocked on a mutex likely owned by task kworker/1:130:3519. 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4328 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534178c r4:85341400 r10:00000000 r9:85303300 r8:8027ed34 r7:eacf1e60 r6:85303380 r5:8529e000 INFO: task kworker/1:450:4328 is blocked on a mutex likely owned by task kworker/1:130:3519. [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4331 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:8529ec00 r4:8529ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8529ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85300bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8529ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534238c r4:85303400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529ec00 r8:8530342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303400 r8:8027ed34 r7:eacf1e60 r6:85303480 r5:8529ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300840 INFO: task kworker/1:451:4331 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:452 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85341f8c r4:85341c00 r4:85303500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303500 r8:8027ed34 r7:eacf9e60 r6:85303580 r5:8529d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300840 INFO: task kworker/1:452:4332 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b3468000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:453:4335 blocked for more than 467 seconds. r4:8529c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534278c r4:85342400 r4:85303600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300980 INFO: task kworker/1:453:4335 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b39ec000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 r5:84adb38c r4:84adb000 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) INFO: task kworker/1:454:4336 blocked for more than 467 seconds. [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286e40 r7:ddde2d40 r6:83018200 r5:85342f8c r4:85303700 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300e80 INFO: task kworker/1:454:4336 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b3b51000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.16.0-rc1-syzkaller #0 r4:849a2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85342b8c r4:85342800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85342b8c r4:85303800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:8530382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303800 r8:8027ed34 r7:eaccde60 r6:85308480 r5:849a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead39fb0 to 0xead39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300fc0 INFO: task kworker/1:455:4339 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b3e58000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:849a3000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534438c r4:85344000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534438c r4:85303880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3000 r8:853038ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303880 r8:8027ed34 r7:eaccde60 r6:85308500 r5:849a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85300f40 INFO: task kworker/1:456:4341 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b4578000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 INFO: task kworker/1:457:4342 blocked for more than 467 seconds. r10:829185c4 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:849a3c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 r9:83018205 r8:849a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead43000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534338c r4:85343000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534338c r4:85303980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3c00 r8:853039ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303980 r8:8027ed34 r7:ead49e60 r6:85308580 r5:849a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852895c0 INFO: task kworker/1:457:4342 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:458 state:D stack:0 pid:4344 tgid:4344 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8534378c r4:85303900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:8530392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303900 r8:8027ed34 r7:ead49e60 r6:85308600 r5:849a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85289ac0 INFO: task kworker/1:458:4344 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b4a97000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4348 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:85231800 r4:85231800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85231800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b5007000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:461:4351 blocked for more than 467 seconds. Call trace: r5:852b0000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853188c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344f8c r4:85344c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85344f8c r4:85303b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b0000 r8:85303bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303b80 r8:8027ed34 r7:ead49e60 r6:85303c00 r5:852b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85318380 INFO: task kworker/1:461:4351 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84aac340 task:kworker/1:462 state:D stack:0 pid:4352 tgid:4352 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534478c r4:85344400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534478c r4:85303c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b0c00 r8:85303cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303c80 r8:8027ed34 r7:ead71e60 r6:85303d00 r5:852b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85318380 INFO: task kworker/1:462:4352 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b53c5000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:463 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85345f8c r4:85345c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85345f8c r4:85303d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b1800 r8:85303dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85303d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85303d80 r8:8027ed34 r7:ead71e60 r6:85303e00 r5:852b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85318840 INFO: task kworker/1:463:4354 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b5855000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adb38c r4:84adb000 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 r4:852b2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318bc0 r5:8534578c r4:85345400 r4:85303e80 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85318a40 INFO: task kworker/1:464:4357 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b5ef5000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85318b80 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b6249000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85326000 r8:8027ed34 r7:ead85e60 r6:85308780 r5:84988000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4364 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:84988c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85318f40 INFO: task kworker/1:467:4364 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b68af000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:468:4366 blocked for more than 467 seconds. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0606000 r7:ddde2d40 r6:83018200 r5:85346b8c r4:85326100 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b6bba000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:4368 blocked for more than 467 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:4368 tgid:4368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:8498bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e086f000 r10:61c88647 r9:8498bc00 r8:853261ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b6efe000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:470:4370 blocked for more than 467 seconds. Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:8498b000 r4:8498b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532e140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8498b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85326200 r8:8027ed34 r7:eadade60 r6:85308980 r5:8498b000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: b725d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r5:84adb38c r4:84adb000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852d278c r4:852d2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d278c r4:85308a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498c800 r8:85308a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85308a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85308a00 r8:8027ed34 r7:eac11e60 r6:85308a80 r5:8498c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530ad00 INFO: task kworker/0:156:4371 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b764c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4373 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:84989800 r4:84989800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84989800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:471:4373 is blocked on a mutex likely owned by task kworker/1:130:3519. r5:800f0013 r4:80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4375 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:8498d400 r4:8498d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:473 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532eb40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8498e000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348b8c r4:85348800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85348b8c r4:85326380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498e000 r8:853263ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326380 r8:8027ed34 r7:eadade60 r6:85308c00 r5:8498e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532e380 INFO: task kworker/1:473:4377 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b7ed6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) INFO: task kworker/1:474:4379 blocked for more than 468 seconds. r5:8498ec00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r9:83018205 r8:8498ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85347f8c r4:85347c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85347f8c r4:85326400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498ec00 r8:8532642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326400 r8:8027ed34 r7:eadd1e60 r6:85308c80 r5:8498ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532e500 INFO: task kworker/1:474:4379 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b80cf000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:475 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:849a6c00 r8:853264ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:475:4381 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b86ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 r10:61c88647 r9:852b8c00 r8:8532652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:477:4385 blocked for more than 468 seconds. r4:852b9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:852b9800 r8:853265ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:157:4387 blocked for more than 468 seconds. r5:852ba400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b2000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d3b8c r4:852d3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d3b8c r4:85308e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ba400 r8:85308eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85308e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85308e80 r8:8027ed34 r7:eac11e60 r6:85308f00 r5:852ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533a880 INFO: task kworker/0:157:4387 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b9077000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r4:852bc800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348f8c r4:85348c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85348f8c r4:85326600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bc800 r8:8532662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326600 r8:8027ed34 r7:eade1e60 r6:85308f80 r5:852bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532ec80 INFO: task kworker/1:478:4391 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b91a9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4393 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadf9d84 r8:00000002 r7:60000113 r6:eadf9d8c r5:852bbc00 r4:852bbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852bbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532ee00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab53000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534978c r4:85349400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534978c r4:85326680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bbc00 r8:853266ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326680 r8:8027ed34 r7:eade1e60 r6:85381080 r5:852bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf9fb0 to 0xeadf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532ed00 INFO: task kworker/1:479:4393 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b95c3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:4394 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:852bd400 r4:852bd400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852bd400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d338c r4:852d3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d338c r4:85381000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bd400 r8:8538102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85381000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85381000 r8:8027ed34 r7:eadcde60 r6:85381100 r5:852bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533ab40 INFO: task kworker/0:158:4394 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b9763000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4396 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae05d84 r8:00000002 r7:60000013 r6:eae05d8c r5:852bec00 r4:852bec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852bec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534ab8c r4:8534a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534ab8c r4:85326700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bec00 r8:8532672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326700 r8:8027ed34 r7:eadf9e60 r6:85381180 r5:852bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532ed00 INFO: task kworker/1:480:4396 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: b9a89000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4397 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85349b8c r4:85349800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82abf1e4 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4399 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae11d84 r8:00000002 r7:60000013 r6:eae11d8c r5:852be000 r4:852be000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852be000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532ea40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852be000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349f8c r4:85349c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85349f8c r4:85326800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852be000 r8:8532682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85326800 r8:8027ed34 r7:eae05e60 r6:85381280 r5:852be000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:84a92780 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:852b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 5fa0: 00000000 00000000 00000000 00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:84750000 r4:84750000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84750000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84750000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534a78c r4:8534a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534a78c r4:85326900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750000 r8:8532692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326900 r8:8027ed34 r7:eae05e60 r6:85381380 r5:84750000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853852c0 INFO: task kworker/1:484:4403 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ba7a4000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ab00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84751800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae81000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534cf8c r4:8534cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534cf8c r4:85326980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84751800 r8:853269ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326980 r8:8027ed34 r7:eae05e60 r6:85381400 r5:84751800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385300 INFO: task kworker/1:485:4406 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eae31d84 r8:00000002 r7:60000113 r6:eae31d8c r5:84752400 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85326a00 r8:8027ed34 r7:eae2de60 r6:85381480 r5:84752400 r4:85385300 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bacfc000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:8534b38c r4:8534b000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:4411 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:84754800 r4:84754800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84754800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84754800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534b78c r4:8534b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84754800 r8:85326b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82abf1e4 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 task:kworker/1:489 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385840 r10:61c88647 r9:852b6000 r8:85326bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326b80 r8:8027ed34 r7:eae2de60 r6:85326c00 r5:852b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853856c0 INFO: task kworker/1:489:4413 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bb503000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:490:4415 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae51d84 r8:00000002 r7:60000013 r6:eae51d8c r5:852b6c00 r4:852b6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853859c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534bf8c r4:8534bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534bf8c r4:85326c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b6c00 r8:85326cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) r4:82abf1e4 r4:dffc9dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:84a92780 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:491 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae59d84 r8:00000002 r7:60000013 r6:eae59d8c r5:852b5400 r4:852b5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534c38c r4:8534c000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534c38c r4:85326d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b5400 r8:85326dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326d80 r8:8027ed34 r7:eae2de60 r6:85326e00 r5:852b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385ac0 INFO: task kworker/1:491:4419 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bbaf4000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4420 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae71d84 r8:00000002 r7:60000013 r6:eae71d8c r5:852b4800 r4:852b4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534c78c r4:8534c400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534c78c r4:85326e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b4800 r8:85326eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326e80 r8:8027ed34 r7:eae2de60 r6:85326f00 r5:852b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385ac0 INFO: task kworker/1:492:4420 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bbdc9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:4421 blocked for more than 468 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eade9d84 r8:00000002 r7:60000013 r6:eade9d8c r5:852b3c00 r4:852b3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534cb8c r4:8534c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534cb8c r4:85326f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3c00 r8:85326fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85326f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85326f80 r8:8027ed34 r7:eae2de60 r6:85397000 r5:852b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade9fb0 to 0xeade9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385ac0 INFO: task kworker/1:493:4421 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bc113000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4424 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:852b3000 r4:852b3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae95000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534d78c r4:8534d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534d78c r4:85397080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3000 r8:853970ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397080 r8:8027ed34 r7:eae2de60 r6:85397100 r5:852b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8533a240 INFO: task kworker/1:494:4424 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bc113000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4425 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae8dd84 r8:00000002 r7:60000113 r6:eae8dd8c r5:849a5400 r4:849a5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530af80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534d38c r4:8534d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534d38c r4:85397180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a5400 r8:853971ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397180 r8:8027ed34 r7:eae79e60 r6:85397200 r5:849a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530a500 INFO: task kworker/1:495:4425 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bc4f0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4428 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:852c0000 r4:852c0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534db8c r4:8534d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534db8c r4:85397280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0000 r8:853972ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397280 r8:8027ed34 r7:eae79e60 r6:85397300 r5:852c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae99fb0 to 0xeae99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b0c0 INFO: task kworker/1:496:4428 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bc684000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4429 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:852c0c00 r4:852c0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534df8c r4:8534dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534df8c r4:85397380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0c00 r8:853973ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397380 r8:8027ed34 r7:eae99e60 r6:85397400 r5:852c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:dffc9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4432 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:852c1800 r4:852c1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852c1800 r8:853974ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8539b340 INFO: task kworker/1:498:4432 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bd280000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:4434 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:852c2400 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:852c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 r5:8534e78c r4:8534e400 r10:61c88647 r9:852c2400 r8:853975ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85397580 r8:8027ed34 r7:eaea1e60 r6:85397600 r5:852c2400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bd5e2000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4436 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaec5d84 r8:00000002 r7:60000013 r6:eaec5d8c r5:852c3000 r4:852c3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534eb8c r4:8534e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534eb8c r4:85397680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c3000 r8:853976ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397680 r8:8027ed34 r7:eaeb5e60 r6:85397700 r5:852c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b5c0 INFO: task kworker/1:500:4436 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4438 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:852c3c00 r4:852c3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534ef8c r4:8534ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534ef8c r4:85397780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c3c00 r8:853977ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397780 r8:8027ed34 r7:eaec5e60 r6:85397800 r5:852c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b7c0 INFO: task kworker/1:501:4438 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bd9df000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4440 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:852c4800 r4:852c4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534f38c r4:8534f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534f38c r4:85397880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c4800 r8:853978ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397880 r8:8027ed34 r7:eaecde60 r6:85397900 r5:852c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b900 INFO: task kworker/1:502:4440 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bdb23000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:503 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:852c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534f78c r4:8534f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8534f78c r4:85397980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c5400 r8:853979ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397980 r8:8027ed34 r7:eaedde60 r6:85397a00 r5:852c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bac0 INFO: task kworker/1:503:4442 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: be4ba000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:504 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85397a80 r8:8027ed34 r7:eaf01e60 r6:85397b00 r5:852c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bc00 INFO: task kworker/1:504:4444 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: be690000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:4446 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacfdd84 r8:00000002 r7:60000113 r6:eacfdd8c r5:84753000 r4:84753000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac300 r5:8535c78c r4:8535c400 r4:85397b80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: be690000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:506 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534ff8c r4:8534fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bd00 INFO: task kworker/1:506:4447 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: be98f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eace1d84 r8:00000002 r7:60000113 r6:eace1d8c r5:84756000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e005b000 r7:dddced40 r6:83018000 r5:852d378c r4:85381700 r4:85381700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85381700 r8:8027ed34 r7:eadcde60 r6:85381780 r5:84756000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538c100 INFO: task kworker/0:159:4449 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: beb2e000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 r4:00000000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853b20c0 Exception stack(0xdffc9d20 to 0xdffc9d68) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:84750c00 r4:84750c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84750c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b2f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84750c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab23000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d3f8c r4:852d3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d3f8c r4:85381900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750c00 r8:8538192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85381900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85381900 r8:8027ed34 r7:eaeade60 r6:85381980 r5:84750c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853b20c0 INFO: task kworker/0:161:4453 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bef6f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffc9dc0 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:4457 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4457 tgid:4457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf11d84 r8:00000002 r7:60000113 r6:eaf11d8c r5:84969800 r4:84969800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84969800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f7000 r5:8535c38c r4:8535c000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r5:00001000 r4:dfe09000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:4458 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:ddde2d40 r6:83018200 r5:8535db8c r4:85397d00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4460 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:8496b000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0765000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8496b000 r8:85397dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:510 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0797000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535cf8c r4:8535cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535cf8c r4:85397e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496a400 r8:85397e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85397e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85397e00 r8:8027ed34 r7:eaf15e60 r6:85381b80 r5:8496a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ac3c0 INFO: task kworker/1:510:4462 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdffc9fb0 to 0xdffc9ff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r10:61c88647 r9:84968c00 r8:85397eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ac500 INFO: task kworker/1:511:4464 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: bfbb2000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:4466 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:853b8c00 r4:853b8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac780 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85397f00 r8:8027ed34 r7:eaf15e60 r6:85397f80 r5:853b8c00 r4:853ac680 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4468 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf55d84 r8:00000002 r7:60000013 r6:eaf55d8c r5:853b9800 r4:853b9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853acac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535df8c r4:8535dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535df8c r4:849b3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b9800 r8:849b302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3000 r8:8027ed34 r7:eaf15e60 r6:849b3080 r5:853b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:4471 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf6dd84 r8:00000002 r7:60000113 r6:eaf6dd8c r5:8496c800 r4:8496c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853acd80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535e78c r4:8535e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535e78c r4:849b3100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:849b312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849b3180 r8:8027ed34 r7:eaf6de60 r6:849b3200 r5:853ba400 r4:853aca00 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4476 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:853bb000 r4:853bb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853bb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535eb8c r4:8535e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535eb8c r4:849b3280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bb000 r8:849b32ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3280 r8:8027ed34 r7:eaf6de60 r6:849b3300 r5:853bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853accc0 INFO: task kworker/1:516:4476 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c07c0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4477 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:853bbc00 r4:853bbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853bbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84399000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849b3380 r8:8027ed34 r7:eaf69e60 r6:849b3400 r5:853bbc00 r4:853accc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:4479 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:853bd400 r4:853bd400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853bd400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84399300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535f38c r4:8535f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535f38c r4:849b3480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bd400 r8:849b34ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3480 r8:8027ed34 r7:eaf75e60 r6:849b3500 r5:853bd400 r4:00000001 Exception stack(0xead5dfb0 to 0xead5dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:4481 blocked for more than 469 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:8496bc00 r4:8496bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8492978c r4:84929400 r10:00000000 r9:85381d00 r8:8027ed34 r7:eaeade60 r6:85381d80 r5:8496bc00 r4:853b2fc0 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4483 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf85d84 r8:00000002 r7:60000013 r6:eaf85d8c r5:8496ec00 r4:8496ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84399400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535f78c r4:8535f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535f78c r4:849b3580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:849b35ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3580 r8:8027ed34 r7:ead5de60 r6:85381e00 r5:8496ec00 Exception stack(0xeaf85fb0 to 0xeaf85ff8) task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:4485 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:8496d400 r4:8496d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843996c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535ff8c r4:8535fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535ff8c r4:849b3600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496d400 r8:849b362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3600 r8:8027ed34 r7:eaf85e60 r6:85381e80 r5:8496d400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82abf1e4 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:521 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:843a0c00 r4:843a0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843994c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535fb8c r4:8535f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8535fb8c r4:849b3680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a0c00 r8:849b36ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3680 r8:8027ed34 r7:eaf8de60 r6:85381f00 r5:843a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84399380 INFO: task kworker/1:521:4487 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:8536078c r4:85360400 r4:849b3700 Exception stack(0xeaf99fb0 to 0xeaf99ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4490 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:843a3000 r4:843a3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843997c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536038c r4:85360000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536038c r4:849b3780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a3000 r8:849b37ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: c1c51000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4493 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:843a3c00 r4:843a3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84399a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85360b8c r4:85360800 r10:00000000 r9:849b3800 r8:8027ed34 r7:eaf99e60 r6:853f1080 r5:843a3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:843998c0 INFO: task kworker/1:524:4493 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c1c51000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84adb38c r4:84adb000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:843a5400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85361b8c r4:85361800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:843a5400 r8:849b38ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:526 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85360f8c r4:85360c00 r4:849b3900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4499 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:843a6000 r4:843a6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84399dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536138c r4:85361000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536138c r4:849b3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a6000 r8:849b39ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3980 r8:8027ed34 r7:eafb5e60 r6:853f1200 r5:843a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84399cc0 INFO: task kworker/1:527:4499 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:4501 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafbdd84 r8:00000002 r7:60000113 r6:eafbdd8c r5:843a2400 r4:843a2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492078c r4:84920400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492078c r4:853f1280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a2400 r8:853f12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853f1280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f1280 r8:8027ed34 r7:eaeade60 r6:853f1300 r5:843a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f44c0 INFO: task kworker/0:163:4501 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85370f8c r4:85370c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85370f8c r4:853f1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a6c00 r8:853f13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853f1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f1380 r8:8027ed34 r7:eafbde60 r6:853f1400 r5:843a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f45c0 INFO: task kworker/0:164:4503 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c2bed000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:dfe09000 r4:84a92780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8536178c r4:849b3a00 Exception stack(0xeafb1fb0 to 0xeafb1ff8) INFO: task kworker/1:528:4504 is blocked on a mutex likely owned by task kworker/1:130:3519. Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c2bed000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4507 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85361f8c r4:849b3b00 Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:4508 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:853be000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f9000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536238c r4:85362000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536238c r4:849b3c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853be000 r8:849b3c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3c00 r8:8027ed34 r7:eafc1e60 r6:849b3c80 r5:853be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 r5:00001000 r4:ead79000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b8000 r8:849b3d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3d00 r8:8027ed34 r7:eaf81e60 r6:849b3d80 r5:853b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f90c0 INFO: task kworker/1:531:4511 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c3284000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:852c6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f91c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536278c r4:85362400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536278c r4:849b3e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c6c00 r8:849b3e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b3e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b3e00 r8:8027ed34 r7:eafcde60 r6:849b3e80 r5:852c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd1fb0 to 0xeafd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdffc9d20 to 0xdffc9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:533:4515 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:853c1800 r4:853c1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f95c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85362f8c r4:849b3f00 Exception stack(0xeafd9fb0 to 0xeafd9ff8) INFO: task kworker/1:533:4515 is blocked on a mutex likely owned by task kworker/1:130:3519. [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eafd5d84 r8:00000002 r7:60000013 r6:eafd5d8c r5:853c0000 r4:853c0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f9680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536338c r4:85363000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536338c r4:85401000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c0000 r8:8540102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401000 r8:8027ed34 r7:eafd9e60 r6:85401080 r5:853c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f9580 INFO: task kworker/1:534:4517 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c36ef000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4519 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:853c3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85363b8c r4:85363800 r10:61c88647 r9:853c3000 r8:8540112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: c3914000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:00000000 r5:00001000 r4:dfe09000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4520 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:853c3c00 r4:853c3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:853c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r10:61c88647 r9:853c3c00 r8:8540122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f9ac0 INFO: task kworker/1:536:4520 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4524 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4524 tgid:4524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:853c4800 r4:853c4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f9c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85363f8c r4:85401300 Exception stack(0xeafddfb0 to 0xeafddff8) INFO: task kworker/1:537:4524 is blocked on a mutex likely owned by task kworker/1:130:3519. 9d60: 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4525 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:84708c00 r4:84708c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84708c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84708c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8536cb8c r4:8536c800 r10:61c88647 r9:84708c00 r8:8540142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f9c00 INFO: task kworker/1:538:4525 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c4030000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f9e00 r5:8536c38c r4:8536c000 r4:85401480 Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f9d40 INFO: task kworker/1:539:4527 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c4220000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:00000001 INFO: task kworker/1:540:4528 blocked for more than 470 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:8470a400 r4:8470a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8470a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f9ec0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82abf1e4 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84709800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536cf8c r4:8536cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536cf8c r4:85401580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84709800 r8:854015ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401580 r8:8027ed34 r7:eb009e60 r6:853f1600 r5:84709800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84aac340 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:8536db8c r4:8536d800 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) r5:00001000 r4:dfe09000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4534 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:8470bc00 r4:8470bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8470bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84aac340 r10:829185c4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:8470c800 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8470c800 r8:8540172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4538 blocked for more than 470 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:8470d400 r4:8470d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8470d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8470d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 r5:8536e78c r4:8536e400 r4:85401780 1fa0: 00000000 00000000 00000000 00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dfe09000 r4:84a92780 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:4540 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:8470e000 r4:8470e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8470e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8470e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536df8c r4:8536dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536df8c r4:85401800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8470e000 r8:8540182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401800 r8:8027ed34 r7:eb061e60 r6:853f1880 r5:8470e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85406500 INFO: task kworker/1:546:4540 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4542 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:853c5400 r4:853c5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c5400 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:ddde2d40 r6:83018200 r5:8536e38c r4:85401880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82abf1e4 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aac340 r4:853c6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r4:82abf1e4 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4549 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:84748000 r4:84748000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84748000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406f80 Exception stack(0xeae3dfb0 to 0xeae3dff8) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c660a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8474a400 r8:85401bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:4555 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:84749800 r4:84749800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84749800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488a380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84749800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537078c r4:85370400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537078c r4:85401c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84749800 r8:85401c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85401c00 r8:8027ed34 r7:eae3de60 r6:853f1b80 r5:84749800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfe09000 r5:84adb38c r4:84adb000 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4557 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a1d84 r8:00000002 r7:60000013 r6:eb0a1d8c r5:8474c800 r4:8474c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488a000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8474c800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05db000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536ff8c r4:8536fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536ff8c r4:85401c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85401c80 r8:8027ed34 r7:eb099e60 r6:853f1c00 r5:8474c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 9d60: 800f0013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4559 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a5d84 r8:00000002 r7:60000013 r6:eb0a5d8c r5:8474d400 r4:8474d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488a180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8474d400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0747000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537038c r4:85370000 r7:ddde2d40 r6:83018200 r5:8537038c r4:85401d00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dffc9dc0 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4561 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4561 tgid:4561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a9d84 r8:00000002 r7:60000013 r6:eb0a9d8c r5:8474e000 r4:8474e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488a500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8474e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0861000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85370b8c r4:85370800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85370b8c r4:85401d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474e000 r8:85401dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401d80 r8:8027ed34 r7:eb099e60 r6:853f1d00 r5:8474e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a9fb0 to 0xeb0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488a340 INFO: task kworker/1:556:4561 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4562 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0add84 r8:00000002 r7:60000013 r6:eb0add8c r5:8474ec00 r4:8474ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488a840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8474ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537178c r4:85371400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537178c r4:85401e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474ec00 r8:85401e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401e00 r8:8027ed34 r7:eb0a9e60 r6:853f1d80 r5:8474ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488a440 INFO: task kworker/1:557:4562 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c7468000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4566 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8474b000 r4:8474b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474b000 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537138c r4:85371000 r10:61c88647 r9:8474b000 r8:85401eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c7855000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:4567 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:8474bc00 r4:8474bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8474bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4570 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84800000 r4:84800000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84800000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84800000 r8:85401f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85401f00 r8:8027ed34 r7:eb0ade60 r6:853f1f80 r5:84800000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488a900 INFO: task kworker/1:559:4570 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c7d10000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfe09000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:84801800 r4:84801800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84801800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488acc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84801800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537238c r4:85372000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537238c r4:85401f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84801800 r8:85401fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85401f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401f80 r8:8027ed34 r7:eb0b9e60 r6:8491f000 r5:84801800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4573 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb079d84 r8:00000002 r7:60000013 r6:eb079d8c r5:853c2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85371f8c r4:85371c00 r10:61c88647 r9:853c2400 r8:8489402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4575 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:853c0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492038c r4:84920000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8492038c r4:84894100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c0c00 r8:8489412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894100 r8:8027ed34 r7:eb0c1e60 r6:84894180 r5:853c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488ae00 INFO: task kworker/1:562:4575 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c8594000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4578 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0c5d84 r8:00000002 r7:60000013 r6:eb0c5d8c r5:853c6000 r4:853c6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488ad80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab93000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537278c r4:85372400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537278c r4:84894200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6000 r8:8489422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894200 r8:8027ed34 r7:eb0bde60 r6:84894280 r5:853c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488ac80 INFO: task kworker/1:563:4578 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c8a01000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4579 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0b1d84 r8:00000002 r7:60000013 r6:eb0b1d8c r5:853c8000 r4:853c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84890040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead95000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85372b8c r4:85372800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85372b8c r4:84894300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c8000 r8:8489432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894300 r8:8027ed34 r7:eb0bde60 r6:84894380 r5:853c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8488ac80 INFO: task kworker/1:564:4579 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c8a01000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:4583 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:853ca400 r4:853ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84920f8c r4:84920c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84920f8c r4:8491f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ca400 r8:8491f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8491f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491f080 r8:8027ed34 r7:eafbde60 r6:84894400 r5:853ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85467240 INFO: task kworker/0:166:4583 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c8f80000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4584 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829185c4 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:853c9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85372f8c r4:85372c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4585 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0ddd84 r8:00000002 r7:60000113 r6:eb0ddd8c r5:853cb000 r4:853cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84894580 r8:8027ed34 r7:eb0d5e60 r6:84894600 r5:853cb000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4587 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:853c8c00 r4:853c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489dcc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8491f100 r8:8027ed34 r7:eb0d9e60 r6:84894680 r5:853c8c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4589 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:853cbc00 r4:853cbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853cbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848906c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537338c r4:85373000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537338c r4:84894700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cbc00 r8:8489472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894700 r8:8027ed34 r7:eb0dde60 r6:84894780 r5:853cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848902c0 INFO: task kworker/1:567:4589 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c9a92000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:568:4592 blocked for more than 471 seconds. r10:829185c4 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:853cd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84890740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537378c r4:85373400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537378c r4:84894800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cd400 r8:8489482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894800 r8:8027ed34 r7:eb0dde60 r6:84894880 r5:853cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890680 INFO: task kworker/1:568:4592 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c9e2a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4594 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:853ce000 r4:853ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84890a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85373f8c r4:85373c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85373f8c r4:84894900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ce000 r8:8489492c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894900 r8:8027ed34 r7:eb0dde60 r6:84894980 r5:853ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890880 INFO: task kworker/1:569:4594 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: c9e2a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4596 blocked for more than 471 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:853cec00 r4:853cec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853cec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84890b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537838c r4:85378000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537838c r4:84894a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cec00 r8:84894a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894a00 r8:8027ed34 r7:eb0d1e60 r6:84894a80 r5:853cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853cc800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84890d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae33000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537878c r4:85378400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537878c r4:84894b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cc800 r8:84894b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894b00 r8:8027ed34 r7:eb0ede60 r6:84894b80 r5:853cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84890980 Call trace: Exception stack(0xdffc9d20 to 0xdffc9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eae5d000 r7:ddde2d40 r6:83018200 r5:85378f8c r4:84894c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890d40 INFO: task kworker/1:572:4600 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ca84b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829185c4 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:853d0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eae41000 r7:ddde2d40 r6:83018200 r5:85378b8c r4:84894d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0c00 r8:84894d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84894d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84894d00 r8:8027ed34 r7:eb0f5e60 r6:84894d80 r5:853d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890d40 INFO: task kworker/1:573:4601 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ca84b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853d1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r5:00001000 r4:eae69000 r10:00000000 r9:84894e00 r8:8027ed34 r7:eb0f5e60 r6:84894e80 r5:853d1800 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829185c4 r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:853d2400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r5:00001000 r4:eae9b000 r4:84894f00 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829185c4 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:853d3000 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85469280 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 r5:00001000 r4:dfe09000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4610 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb109d84 r8:00000002 r7:60000013 r6:eb109d8c r5:853d3c00 r4:853d3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854694c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85379b8c r4:85379800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85379b8c r4:8546f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3c00 r8:8546f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f100 r8:8027ed34 r7:eb101e60 r6:8546f180 r5:853d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 task:kworker/1:578 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8546f200 r8:8027ed34 r7:eb101e60 r6:8546f280 r5:853d4800 r4:85469880 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4614 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:853d5400 r4:853d5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85469900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537a78c r4:8537a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537a78c r4:8546f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d5400 r8:8546f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f300 r8:8027ed34 r7:eb10de60 r6:8546f380 r5:853d5400 r4:00000001 Exception stack(0xeb119fb0 to 0xeb119ff8) r4:85469700 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:580 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85469a80 r5:8537ab8c r4:8537a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:854698c0 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4617 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:853d6c00 r4:853d6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85469c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537af8c r4:8537ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537af8c r4:8546f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854698c0 INFO: task kworker/1:581:4617 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cc117000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r4:dffc9dc0 r5:84adb38c r4:84adb000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:84803000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8537b38c r4:8546f600 r10:00000000 r9:8546f600 r8:8027ed34 r7:eb0fde60 r6:8491f180 r5:84803000 r4:85469d80 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:84800c00 r4:84800c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84800c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c6c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84800c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb141000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537bb8c r4:8537b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537bb8c r4:8546f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84800c00 r8:8546f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f680 r8:8027ed34 r7:eb129e60 r6:8491f200 r5:84800c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85469e00 INFO: task kworker/1:583:4622 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cc931000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:4623 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:84804800 r4:84804800 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8537b78c r4:8537b400 r10:00000000 r9:8546f700 r8:8027ed34 r7:eb135e60 r6:8491f280 r5:84804800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cc931000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:4625 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:585 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84806000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84806000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549478c r4:85494400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549478c r4:8546f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806000 r8:8546f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb149fb0 to 0xeb149ff8) r4:84890fc0 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:586 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84805400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537bf8c r4:8537bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537bf8c r4:8546f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84805400 r8:8546f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f800 r8:8027ed34 r7:eb149e60 r6:8491f380 r5:84805400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85469e40 INFO: task kworker/1:586:4627 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ccc8c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:587 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854810c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84803c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549438c r4:85494000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549438c r4:8546f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84803c00 r8:8546f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f880 r8:8027ed34 r7:eb149e60 r6:8491f400 r5:84803c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481280 INFO: task kworker/1:587:4629 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cd56e000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4631 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:84806c00 r4:84806c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84806c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854813c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85494b8c r4:85494800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85494b8c r4:8546f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806c00 r8:8546f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f900 r8:8027ed34 r7:eb149e60 r6:8491f480 r5:84806c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:589 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84802400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84802400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84802400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0741000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85495f8c r4:85495c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85495f8c r4:8546f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84802400 r8:8546f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f980 r8:8027ed34 r7:eb015e60 r6:8491f500 r5:84802400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481480 INFO: task kworker/1:589:4633 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cde7b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854814c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8470ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff13000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85494f8c r4:85494c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85494f8c r4:8546fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8470ec00 r8:8546faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fa80 r8:8027ed34 r7:eb035e60 r6:8491f580 r5:8470ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481600 INFO: task kworker/1:590:4635 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:84adb38c r4:84adb000 r4:84a92780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:591:4637 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb16dd84 r8:00000002 r7:60000013 r6:eb16dd8c r5:85418c00 r4:85418c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85418c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85418c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0091000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549538c r4:85495000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549538c r4:8546fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85418c00 r8:8546fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fa00 r8:8027ed34 r7:eb035e60 r6:8491f600 r5:85418c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481500 INFO: task kworker/1:591:4637 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ce4c7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4639 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb175d84 r8:00000002 r7:60000113 r6:eb175d8c r5:85418000 r4:85418000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85418000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549578c r4:85495400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8546fb00 r8:8027ed34 r7:eb035e60 r6:8491f680 r5:85418000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85481580 INFO: task kworker/1:592:4639 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ce706000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:4641 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:85419800 r4:85419800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85419800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89eb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85496f8c r4:85496c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85496f8c r4:8546fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85419800 r8:8546fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fb80 r8:8027ed34 r7:eb035e60 r6:8491f700 r5:85419800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481780 INFO: task kworker/1:593:4641 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ce706000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4644 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:8541b000 r4:8541b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549638c r4:85496000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549638c r4:8546fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541b000 r8:8546fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fc00 r8:8027ed34 r7:eb17de60 r6:8491f780 r5:8541b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481b00 INFO: task kworker/1:594:4644 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cea82000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84adb38c r4:84adb000 r4:84a92780 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:8541bc00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e495b000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8546fc80 r10:00000000 r9:8546fc80 r8:8027ed34 r7:eb17de60 r6:8491f800 r5:8541bc00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481dc0 INFO: task kworker/1:595:4646 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cefa9000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4648 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:8541c800 r4:8541c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85481f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85496b8c r4:85496800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85496b8c r4:8546fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541c800 r8:8546fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fd00 r8:8027ed34 r7:eb17de60 r6:8491f880 r5:8541c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481c40 INFO: task kworker/1:596:4648 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cf20f000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:4651 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:8541ec00 r4:8541ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549738c r4:85497000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549738c r4:8546fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541ec00 r8:8546fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fd80 r8:8027ed34 r7:eb17de60 r6:8491f900 r5:8541ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85481ec0 INFO: task kworker/1:597:4651 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cf5df000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:4653 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:8541a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85497f8c r4:85497c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85497f8c r4:8546fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541a400 r8:8546fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fe00 r8:8027ed34 r7:eb199e60 r6:8491f980 r5:8541a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85467e40 INFO: task kworker/1:598:4653 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cf87a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb040 r5:8549778c r4:85497400 r10:00000000 r9:8546fe80 r8:8027ed34 r7:eb1a1e60 r6:8491fa00 r5:8541e000 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85467e40 INFO: task kworker/1:599:4654 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: cf998000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:4656 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:84720000 r4:84720000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84720000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84720000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85497b8c r4:85497800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85497b8c r4:8546ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8546ff00 Exception stack(0xeb1adfb0 to 0xeb1adff8) task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:601 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84721800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85498b8c r4:85498800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85498b8c r4:8546ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84721800 r8:8546ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8546ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546ff80 r8:8027ed34 r7:eb1a1e60 r6:8491fb00 r5:84721800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4660 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:84723000 r4:84723000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84723000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84723000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac49000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549838c r4:85498000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549838c r4:846c7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84723000 r8:846c702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb1bdfb0 to 0xeb1bdff8) r4:845bb280 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:4662 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb121d84 r8:00000002 r7:60000113 r6:eb121d8c r5:853d8000 r4:853d8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549878c r4:85498400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549878c r4:846c7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d8000 r8:846c70ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7080 r8:8027ed34 r7:eb1b5e60 r6:846c7100 r5:853d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bb380 INFO: task kworker/1:603:4662 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d0534000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:4665 blocked for more than 472 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:853d9800 r4:853d9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bbc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549978c r4:85499400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549978c r4:846c7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d9800 r8:846c71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7180 r8:8027ed34 r7:eb1b5e60 r6:846c7200 r5:853d9800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4666 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1cdd84 r8:00000002 r7:60000013 r6:eb1cdd8c r5:84722400 r4:84722400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84722400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84722400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85498f8c r4:85498c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85498f8c r4:846c7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84722400 r8:846c72ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7280 r8:8027ed34 r7:eb1c1e60 r6:8491fc00 r5:84722400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bb640 INFO: task kworker/1:605:4666 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d0b67000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:4668 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1d5d84 r8:00000002 r7:60000013 r6:eb1d5d8c r5:84723c00 r4:84723c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84723c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bb980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549938c r4:85499000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549938c r4:846c7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84723c00 r8:846c732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7300 r8:8027ed34 r7:eb1c1e60 r6:8491fc80 r5:84723c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bb640 INFO: task kworker/1:606:4668 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d0cdf000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:4669 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:84725400 r4:84725400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84725400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bbcc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84725400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85499b8c r4:85499800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85499b8c r4:846c7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84725400 r8:846c73ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7380 r8:8027ed34 r7:eb1c1e60 r6:8491fd00 r5:84725400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bb640 INFO: task kworker/1:607:4669 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d105a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:4672 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:84726000 r4:84726000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84726000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aebc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84726000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae47000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492378c r4:84923400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492378c r4:8491fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84726000 r8:8491fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8491fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491fd80 r8:8027ed34 r7:eb0d9e60 r6:8491fe00 r5:84726000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8489d200 INFO: task kworker/0:168:4672 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d12f3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:4674 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:84726c00 r4:84726c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84726c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84900b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84726c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492138c r4:84921000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492138c r4:8491fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84726c00 r8:8491feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8491fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491fe80 r8:8027ed34 r7:eb1c9e60 r6:8491ff00 r5:84726c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8489d200 INFO: task kworker/0:169:4674 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d15ed000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:4677 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:84724800 r4:84724800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84724800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bbe80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84724800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85499f8c r4:85499c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85499f8c r4:846c7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84724800 r8:846c742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7400 r8:8027ed34 r7:eb1d9e60 r6:8491ff80 r5:84724800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bbd80 INFO: task kworker/1:608:4677 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d1783000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:4678 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1edd84 r8:00000002 r7:60000113 r6:eb1edd8c r5:8496e000 r4:8496e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845bbf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead75000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549a38c r4:8549a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549a38c r4:846c7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496e000 r8:846c74ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7480 r8:8027ed34 r7:eb1e9e60 r6:846c8000 r5:8496e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bbd80 INFO: task kworker/1:609:4678 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d1986000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:4681 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:85428c00 r4:85428c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85428c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85428c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf65000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549b78c r4:8549b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549b78c r4:846c7500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85428c00 r8:846c752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7500 r8:8027ed34 r7:eb1ede60 r6:846c8080 r5:85428c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bbdc0 INFO: task kworker/1:610:4681 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d1c91000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:4682 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:85429800 r4:85429800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85429800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549a78c r4:8549a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549a78c r4:846c7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85429800 r8:846c75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7580 r8:8027ed34 r7:eb1f9e60 r6:846c8100 r5:85429800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845bbf80 INFO: task kworker/1:611:4682 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d1f0b000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:4685 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb209d84 r8:00000002 r7:60000113 r6:eb209d8c r5:85428000 r4:85428000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85428000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf17000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549ab8c r4:8549a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549ab8c r4:846c7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85428000 r8:846c762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7600 r8:8027ed34 r7:eb1f9e60 r6:846c8180 r5:85428000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1280 INFO: task kworker/1:612:4685 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d2141000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:4686 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb20dd84 r8:00000002 r7:60000013 r6:eb20dd8c r5:8542a400 r4:8542a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549af8c r4:8549ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549af8c r4:846c7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542a400 r8:846c76ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7680 r8:8027ed34 r7:eb1f9e60 r6:846c8200 r5:8542a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1100 INFO: task kworker/1:613:4686 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d2664000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:4688 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1ddd84 r8:00000002 r7:60000013 r6:eb1ddd8c r5:853db000 r4:853db000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853db000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549b38c r4:8549b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549b38c r4:846c7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853db000 r8:846c772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7700 r8:8027ed34 r7:eb1f9e60 r6:846c7780 r5:853db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f12c0 INFO: task kworker/1:614:4688 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d289c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:4691 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a078c r4:854a0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a078c r4:846c7800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dbc00 r8:846c782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7800 r8:8027ed34 r7:eb1f9e60 r6:846c7880 r5:853dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848f14c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffc9d20 to 0xdffc9d68) r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853dc800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8549bb8c r4:8549b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549bb8c r4:846c7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dc800 r8:846c792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7900 r8:8027ed34 r7:eb211e60 r6:846c7980 r5:853dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f14c0 INFO: task kworker/1:616:4692 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d2c31000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853dec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846c7a00 r8:8027ed34 r7:eb211e60 r6:846c7a80 r5:853dec00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1800 INFO: task kworker/1:617:4694 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d2ea1000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a038c r4:854a0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a038c r4:846c7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853da400 r8:846c7b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7b00 r8:8027ed34 r7:eb211e60 r6:846c7b80 r5:853da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1800 INFO: task kworker/1:618:4696 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r5:00001000 r4:dfe09000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:170 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:853de000 r4:853de000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853de000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84900f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb045000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492178c r4:84921400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492178c r4:846c8280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853de000 r8:846c82ac r7:82804d40 r6:dddced40 r5:dddced60 r4:846c8280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c8280 r8:8027ed34 r7:eb1c9e60 r6:846c7c00 r5:853de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84900bc0 INFO: task kworker/0:170:4699 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d34ce000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f1e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a0b8c r4:854a0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a0b8c r4:846c7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d8c00 r8:846c7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7c80 r8:8027ed34 r7:eb211e60 r6:846c7d00 r5:853d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1d00 INFO: task kworker/1:619:4702 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d37f0000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:84adb38c r4:84adb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eb231d84 r8:00000002 r7:60000013 r6:eb231d8c r5:853dd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a138c r4:854a1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a138c r4:846c7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dd400 r8:846c7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7d80 r8:8027ed34 r7:eb219e60 r6:846c7e00 r5:853dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848f1e80 INFO: task kworker/1:620:4703 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:84adb38c r4:84adb000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb023000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a0f8c r4:854a0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a0f8c r4:846c7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e0c00 r8:846c7eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846c7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c7e80 r8:8027ed34 r7:eb231e60 r6:846c7f00 r5:854e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ed100 INFO: task kworker/1:621:4706 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d3ae6000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r5:84adb38c r4:84adb000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb23dfb0 to 0xeb23dff8) r4:00000000 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:4711 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb245d84 r8:00000002 r7:60000113 r6:eb245d8c r5:8542b000 r4:8542b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854a178c r4:854a1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2080 r8:8027ed34 r7:eb23de60 r6:846c8400 r5:8542b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ed4c0 INFO: task kworker/1:623:4711 is blocked on a mutex likely owned by task kworker/1:130:3519. r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:854a1b8c r4:854a1800 9fa0: 00000000 00000000 00000000 00000000 r4:854ed4c0 INFO: task kworker/1:624:4712 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d46f1000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed840 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2180 r8:8027ed34 r7:eb23de60 r6:846c8500 r5:8542ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854ed800 INFO: task kworker/1:625:4715 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:626:4717 blocked for more than 473 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb241fb0 to 0xeb241ff8) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:627 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:854e3000 r4:854e3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:4721 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r5:854a3b8c r4:854a3800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d5a2c000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:854e6c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r10:61c88647 r9:854e6c00 r8:854f262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:4726 blocked for more than 473 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:854e3c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fb000 Exception stack(0xeb29dfb0 to 0xeb29dff8) r4:00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xeb279fb0 to 0xeb279ff8) Exception stack(0xdffc9d20 to 0xdffc9d68) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:4732 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2add84 r8:00000002 r7:60000013 r6:eb2add8c r5:854e0000 r4:854e0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:00000001 INFO: task kworker/1:634:4733 blocked for more than 474 seconds. r4:00000000 r5:00001000 r4:eb2bd000 Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) r4:854fb480 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:4735 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:635 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:854c8c00 r4:854c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d6f2a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:636 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb2cb000 r7:ddde2d40 r6:83018200 r5:854acb8c r4:854f2c00 Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 800f0013 ffffffff r4:00000000 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:4738 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:854cb000 r4:854cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fbc80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa39000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ad38c r4:854ad000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ad38c r4:854f2d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:854f2d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854f2d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2d00 r8:8027ed34 r7:eb2b5e60 r6:854f2d80 r5:854cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854fb680 INFO: task kworker/1:637:4738 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe09000 r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:854c9800 r4:854c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a50c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb165000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84921f8c r4:84921c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84921f8c r4:846c8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c9800 r8:846c85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:846c8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846c8580 r8:8027ed34 r7:eb1c9e60 r6:854f2e00 r5:854c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9b340 INFO: task kworker/0:172:4741 is blocked on a mutex likely owned by task kworker/1:130:3519. r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffc9fb0 to 0xdffc9ff8) INFO: task kworker/1:638:4744 blocked for more than 474 seconds. Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:854cc800 r4:854cc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fbd80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc81000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ad78c r4:854ad400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ad78c r4:854f2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cc800 r8:854f2eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854f2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2e80 r8:8027ed34 r7:eb2d9e60 r6:854f2f00 r5:854cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854fbf40 INFO: task kworker/1:638:4744 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d7bb3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854f2f80 r8:8027ed34 r7:eb2c1e60 r6:84a4b000 r5:854cd400 r4:84900000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:4747 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:854ce000 r4:854ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:854adb8c r4:854ad800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:854fbec0 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:4750 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:854cec00 r4:854cec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ae38c r4:854ae000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ae38c r4:84a4b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cec00 r8:84a4b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b180 r8:8027ed34 r7:eb091e60 r6:84a4b200 r5:854cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53280 INFO: task kworker/1:641:4750 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:854cbc00 r8:84a4b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b280 r8:8027ed34 r7:eb12de60 r6:84a4b300 r5:854cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53280 INFO: task kworker/1:642:4751 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d86fa000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:643 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:8542bc00 r4:8542bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ae78c r4:854ae400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ae78c r4:84a4b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542bc00 r8:84a4b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b380 r8:8027ed34 r7:eb2e9e60 r6:846c8600 r5:8542bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53440 INFO: task kworker/1:643:4753 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d892d000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8542c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854af38c r4:854af000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854af38c r4:84a4b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542c800 r8:84a4b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b400 r10:00000000 r9:84a4b400 r8:8027ed34 r7:eb2e9e60 r6:846c8680 r5:8542c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdffc9fb0 to 0xdffc9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:4757 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2fdd84 r8:00000002 r7:60000013 r6:eb2fdd8c r5:8541d400 r4:8541d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4939000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aef8c r4:854aec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854aef8c r4:84a4b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541d400 r8:84a4b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b480 r8:8027ed34 r7:eb2f9e60 r6:846c8700 r5:8541d400 Exception stack(0xeb2fdfb0 to 0xeb2fdff8) r4:84a535c0 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:dffc9dc0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:4758 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:84720c00 r4:84720c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84720c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84720c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84720c00 r8:84a4b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82abf1e4 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:4760 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:849c8000 r4:849c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53900 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb305fb0 to 0xeb305ff8) r4:84a53500 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4763 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:849ca400 r4:849ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab87000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854afb8c r4:854af800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854afb8c r4:84a4b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:84a4b62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b600 r8:8027ed34 r7:eb301e60 r6:846c8880 r5:849ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53b00 INFO: task kworker/1:648:4763 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:4764 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4767 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:849c9800 r4:849c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4768 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:849cb000 r4:849cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a53e00 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a4b780 r8:8027ed34 r7:eb321e60 r6:846c8a00 r5:849cb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d99c3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:4771 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4772 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb335d84 r8:00000002 r7:60000013 r6:eb335d8c r5:849cbc00 r4:849cbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849cbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b4f8c r4:84a4b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cbc00 r8:84a4b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b880 r8:8027ed34 r7:eb331e60 r6:846c8b00 r5:849cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53e80 INFO: task kworker/1:653:4772 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: d9e19000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d60: 800f0013 ffffffff r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 task:kworker/1:654 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b5b8c r4:854b5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b5b8c r4:84a4b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ce000 r8:84a4b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4b900 r8:8027ed34 r7:eb331e60 r6:846c8b80 r5:849ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1180 INFO: task kworker/1:654:4774 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 800f0013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:4775 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:854b578c r4:854b5400 r4:84a4b980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ab1180 INFO: task kworker/1:655:4775 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: da3af000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:84adb38c r4:84adb000 r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 task:kworker/1:656 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:849cd400 r4:849cd400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849cd400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b5f8c r4:854b5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b5f8c r4:84a4ba00 r4:84a4ba00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92780 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:657:4781 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84760c00 r4:84760c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84760c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b638c r4:854b6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b638c r4:84a4ba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760c00 r8:84a4baac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4ba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4ba80 r8:8027ed34 r7:eb341e60 r6:846c8d00 r5:84760c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1540 INFO: task kworker/1:657:4781 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 Exception stack(0xdffc9d20 to 0xdffc9d68) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:658:4783 blocked for more than 475 seconds. Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:84760000 r4:84760000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ede00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84760000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b838c r4:854b8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b838c r4:84a4bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800f0013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 task:kworker/1:659 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84762400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b678c r4:854b6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b678c r4:84a4bb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84762400 r8:84a4bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4bb80 r8:8027ed34 r7:eb351e60 r6:846c8e00 r5:84762400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1600 INFO: task kworker/1:659:4784 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: db001000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a4bc00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1a40 INFO: task kworker/1:660:4786 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: db4eb000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:4789 blocked for more than 475 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84763000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae7f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1980 INFO: task kworker/1:661:4789 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: db767000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:4790 blocked for more than 475 seconds. Call trace: [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a4bd00 dfa0: 00000000 00000000 00000000 00000000 r4:84ab1880 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: dba70000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:4793 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:84766c00 r4:84766c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84766c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeaf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b778c r4:854b7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b778c r4:84a4bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766c00 r8:84a4bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4bd80 r8:8027ed34 r7:eb351e60 r6:84a29000 r5:84766c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1b40 INFO: task kworker/1:663:4793 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:4795 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:84765400 r4:84765400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84765400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab1dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84765400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b7b8c r4:854b7800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b7b8c r4:84a4be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84765400 r8:84a4be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4be00 r8:8027ed34 r7:eb351e60 r6:84a29080 r5:84765400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1cc0 INFO: task kworker/1:664:4795 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: dc054000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:665:4796 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r4:84766000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb38de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c6ec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84766000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b7f8c r4:854b7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b7f8c r4:84a4be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766000 r8:84a4beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4be80 r8:8027ed34 r7:eb351e60 r6:84a29100 r5:84766000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1e00 INFO: task kworker/1:665:4796 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: dc054000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:4798 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85430c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85430c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b878c r4:854b8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b878c r4:84a4bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85430c00 r8:84a4bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a4bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4bf00 r8:8027ed34 r7:eb351e60 r6:84a29180 r5:85430c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ab1fc0 INFO: task kworker/1:666:4798 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85431800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4bf80 r8:8027ed34 r7:eb395e60 r6:84a29200 r5:85431800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:4803 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb39dd84 r8:00000002 r7:60000013 r6:eb39dd8c r5:85432400 r4:85432400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85432400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:4805 blocked for more than 475 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3a1d84 r8:00000002 r7:60000013 r6:eb3a1d8c r5:85433000 r4:85433000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85433000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b9b8c r4:854b9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aa0080 r8:8027ed34 r7:eb39de60 r6:84a29300 r5:85433000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdffc9d20 to 0xdffc9d68) r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:4806 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85433c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa16c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85433c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b978c r4:854b9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b978c r4:84aa0100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85433c00 r8:84aa012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0100 r8:8027ed34 r7:eb3a1e60 r6:84a29380 r5:85433c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1580 INFO: task kworker/1:670:4806 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: dd422000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe09000 r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:173:4809 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:85434800 r4:85434800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85434800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a20040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85434800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492238c r4:84922000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492238c r4:84a29400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a29400 r8:8027ed34 r7:eb1c9e60 r6:84a29480 r5:85434800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a50bc0 INFO: task kworker/0:173:4809 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: dd422000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84adb38c r4:84adb000 r4:84a92780 Exception stack(0xdffc9fb0 to 0xdffc9ff8) r4:84aac340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1800 INFO: task kworker/1:671:4812 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: ddba3000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:4814 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d1d84 r8:00000002 r7:60000013 r6:eb3d1d8c r5:85436000 r4:85436000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85436000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1c80 r5:854ba78c r4:854ba400 r7:ddde2d40 r6:83018200 r5:854ba78c r4:84aa0200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85436000 r8:84aa022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0200 r8:8027ed34 r7:eb3c1e60 r6:84a29580 r5:85436000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1b00 INFO: task kworker/1:672:4814 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:673:4816 blocked for more than 475 seconds. [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa19c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ba38c r4:854ba000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ba38c r4:84aa0280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:84aa02ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0280 r8:8027ed34 r7:eb3d1e60 r6:84aa0300 r5:853e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1b00 INFO: task kworker/1:673:4816 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: de12a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:4818 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:85436c00 r4:85436c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85436c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a20280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85436c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492278c r4:84922400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492278c r4:84a29600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85436c00 r8:84a2962c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a29600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a29600 r8:8027ed34 r7:eb1c9e60 r6:84a29680 r5:85436c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a20080 INFO: task kworker/0:174:4818 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: de12a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4819 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:85430000 r4:85430000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85430000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85430000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854baf8c r4:854bac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854baf8c r4:84aa0380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85430000 r8:84aa03ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0380 r8:8027ed34 r7:eb3d1e60 r6:84a29700 r5:85430000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1c40 INFO: task kworker/1:674:4819 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: de12a000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:4822 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:4822 tgid:4822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84764800 r4:84764800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84764800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84764800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84922f8c r4:84922c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84922f8c r4:84a29780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84764800 r8:84a297ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a29780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a29780 r8:8027ed34 r7:eb1c9e60 r6:84a29800 r5:84764800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a20240 INFO: task kworker/0:175:4822 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: deef7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:4823 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:847c8000 r4:847c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bab8c r4:854ba800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bab8c r4:84aa0400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8000 r8:84aa042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0400 r8:8027ed34 r7:eb3e1e60 r6:84a29880 r5:847c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1b00 INFO: task kworker/1:675:4823 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: deef7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4826 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:847c8c00 r4:847c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb38c r4:854bb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb38c r4:84aa0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:84aa04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0480 r8:8027ed34 r7:eb3e1e60 r6:84a29900 r5:847c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1d00 INFO: task kworker/1:676:4826 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: df2ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:4829 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:4829 tgid:4829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1f1d84 r8:00000002 r7:60000013 r6:eb1f1d8c r5:847c9800 r4:847c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb78c r4:854bb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb78c r4:84aa0500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:84aa052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0500 r8:8027ed34 r7:eb161e60 r6:84a29980 r5:847c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e0c0 INFO: task kworker/1:677:4829 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: df2ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:4830 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:847ca400 r4:847ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bbb8c r4:854bb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bbb8c r4:84aa0580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:84aa05ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0580 r8:8027ed34 r7:eb1f1e60 r6:84a29a00 r5:847ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4832 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:847cc800 r4:847cc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bbf8c r4:854bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bbf8c r4:84aa0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:84aa062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0600 r8:8027ed34 r7:eb201e60 r6:84a29a80 r5:847cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:90000013 r4:80239bd0 r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:84a9c1c0 task:kworker/1:680 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e180 INFO: task kworker/1:680:4833 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:4835 blocked for more than 475 seconds. task:kworker/1:681 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e440 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:854bc38c r4:84aa0700 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e400 INFO: task kworker/1:681:4835 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:4837 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:847cb000 r4:847cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ea40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd78c r4:854bd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bd78c r4:84aa0780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:84aa07ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0780 r8:8027ed34 r7:eb401e60 r6:84a29c00 r5:847cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e3c0 INFO: task kworker/1:682:4837 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:4839 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:847ce000 r4:847ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcf8c r4:854bcc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847ce000 r8:84aa08ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e8c0 INFO: task kworker/1:683:4839 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854bd38c r4:854bd000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r5:8495d38c r4:8495d000 r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:85508000 r4:85508000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85508000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ed00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdf8c r4:854bdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bdf8c r4:84aa0980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85508000 r8:84aa09ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0980 r8:8027ed34 r7:eb411e60 r6:84a29d80 r5:85508000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e900 INFO: task kworker/1:685:4843 is blocked on a mutex likely owned by task kworker/0:78:3501. Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:686 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r4:84aa0a00 r4:84a2e9c0 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4847 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:8550a400 r4:8550a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ed80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be38c r4:854be000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854be38c r4:84aa0a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550a400 r8:84aa0aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0a80 r8:8027ed34 r7:eb43de60 r6:84a29e80 r5:8550a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2eb40 INFO: task kworker/1:687:4847 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:688 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:85509800 r8:84aa0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:4851 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4851 tgid:4851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:8550d400 r4:8550d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ef80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be78c r4:854be400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854be78c r4:84aa0b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:84aa0bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0b80 r8:8027ed34 r7:eb455e60 r6:84a29f80 r5:8550d400 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:690:4853 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:8550c800 r4:8550c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a20740 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe1f000 r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:691:4856 blocked for more than 476 seconds. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead45000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf38c r4:854bf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bf38c r4:84aa0c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550bc00 r8:84aa0cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0c80 r8:8027ed34 r7:eb455e60 r6:85544080 r5:8550bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541080 INFO: task kworker/1:691:4856 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:692:4858 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 r5:00001000 r4:ead73000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb479fb0 to 0xeb479ff8) INFO: task kworker/1:692:4858 is blocked on a mutex likely owned by task kworker/0:78:3501. [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r4:dff95dc0 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a44080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c138c r4:854c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c138c r4:84aa0d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550ec00 r8:84aa0dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0d80 r8:8027ed34 r7:eb479e60 r6:85544180 r5:8550ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541140 INFO: task kworker/1:693:4859 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:694 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84778c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855414c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bfb8c r4:854bf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bfb8c r4:84aa0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84778c00 r8:84aa0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 r4:00000001 INFO: task kworker/1:695:4863 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r7:ddde2d40 r6:83018200 r5:854bff8c r4:84aa0e80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4865 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:8477b000 r4:8477b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c038c r4:854c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c038c r4:84aa0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477b000 r8:84aa0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0f00 r8:8027ed34 r7:eb47de60 r6:85544300 r5:8477b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541500 INFO: task kworker/1:696:4865 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff95fb0 to 0xdff95ff8) task:kworker/1:697 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 r7:ddde2d40 r6:83018200 r5:854c078c r4:84aa0f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:90000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:4869 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:84779800 r4:84779800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84779800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855418c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84779800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c0b8c r4:854c0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c0b8c r4:85550080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84779800 r8:855500ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550080 r8:8027ed34 r7:eb47de60 r6:85544400 r5:84779800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541800 INFO: task kworker/1:698:4869 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:84778000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:854c0f8c r4:85550000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 90000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4874 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:8477c800 r4:8477c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c178c r4:854c1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c178c r4:85550100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477c800 r8:8555012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550100 r8:8027ed34 r7:eb47de60 r6:85544500 r5:8477c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855419c0 INFO: task kworker/1:700:4874 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:4876 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:8477ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c278c r4:854c2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c278c r4:85550180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85550180 r8:8027ed34 r7:eb4b9e60 r6:85544580 r5:8477ec00 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:4877 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:8477d400 r4:8477d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c1f8c r4:854c1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c1f8c r4:85550280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477d400 r8:855502ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550280 r8:8027ed34 r7:eb4c1e60 r6:85544680 r5:8477d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541f80 INFO: task kworker/1:703:4879 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4881 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:85520c00 r4:85520c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85520c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a50480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85520c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c238c r4:854c2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c238c r4:85550300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520c00 r8:8555032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550300 r8:8027ed34 r7:eb4c1e60 r6:85544700 r5:85520c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:704:4881 is blocked on a mutex likely owned by task kworker/0:78:3501. Exception stack(0xdff95d20 to 0xdff95d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:705:4884 blocked for more than 476 seconds. r10:829185c4 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85522400 r4:85522400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85522400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855603c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85522400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb163000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c338c r4:854c3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c338c r4:85550380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:855503ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550380 r8:8027ed34 r7:eb4c1e60 r6:85544780 r5:85522400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560080 INFO: task kworker/1:705:4884 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:706 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85523000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855601c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85523000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c2b8c r4:854c2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c2b8c r4:85550400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523000 r8:8555042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550400 r8:8027ed34 r7:eb4dde60 r6:85544800 r5:85523000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560080 INFO: task kworker/1:706:4885 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 Exception stack(0xdff95d20 to 0xdff95d68) r4:00000000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:707:4887 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:853e4800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:854c2f8c r4:854c2c00 r7:ddde2d40 r6:83018200 r5:854c2f8c r4:85550480 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560180 INFO: task kworker/1:707:4887 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:4890 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853e5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c378c r4:854c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c378c r4:85550580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e5400 r8:855505ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560400 INFO: task kworker/1:708:4890 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) INFO: task kworker/1:709:4891 is blocked on a mutex likely owned by task kworker/0:78:3501. 5d60: 90000013 ffffffff [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:4894 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:853e6c00 r4:853e6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c438c r4:854c4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c438c r4:85550780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:855507ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85560540 Call trace: r4:00000000 5d60: 90000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:711:4895 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:853e0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c3f8c r4:854c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c3f8c r4:85550880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0c00 r8:855508ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550880 r8:8027ed34 r7:eb4ede60 r6:85550900 r5:853e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560540 INFO: task kworker/1:711:4895 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:4898 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4f9d84 r8:00000002 r7:60000013 r6:eb4f9d8c r5:853e2400 r4:853e2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a204c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4f8c r4:854c4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c4f8c r4:85550980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e2400 r8:855509ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550980 r8:8027ed34 r7:eb4ede60 r6:85550a00 r5:853e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560a40 INFO: task kworker/1:712:4898 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:84a44080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:853e3c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) INFO: task kworker/1:713:4900 is blocked on a mutex likely owned by task kworker/0:78:3501. Exception stack(0xdff95d20 to 0xdff95d68) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:4903 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:853e8000 r4:853e8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c538c r4:854c5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c538c r4:85550b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:85550bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550b80 r8:8027ed34 r7:eb4f9e60 r6:85550c00 r5:853e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560b00 INFO: task kworker/1:714:4903 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:715 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85524800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0181000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c578c r4:854c5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c578c r4:85550c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85524800 r8:85550cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550c80 r8:8027ed34 r7:eb2d5e60 r6:85544880 r5:85524800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a8180 INFO: task kworker/1:715:4904 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:716:4906 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a8240 INFO: task kworker/1:716:4906 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:4909 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:85526c00 r4:85526c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85526c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5f8c r4:854c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c5f8c r4:85550e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526c00 r8:85550e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550e00 r8:8027ed34 r7:eb2e5e60 r6:85544980 r5:85526c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a83c0 INFO: task kworker/1:717:4909 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa040 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 90000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84a9c1c0 r5:85525400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb505fb0 to 0xeb505ff8) r4:855a84c0 Workqueue: events bpf_prog_free_deferred 5d60: 90000013 ffffffff r4:dff95dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:4916 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:853e9800 r4:853e9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a89c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6b8c r4:854c6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c6b8c r4:85550f80 r10:00000000 r9:85550f80 r8:8027ed34 r7:eb375e60 r6:855b2000 r5:853e9800 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8550e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492338c r4:84923000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492338c r4:85544b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550e000 r8:85544bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85544b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544b80 r8:8027ed34 r7:eb1c9e60 r6:85544c00 r5:8550e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ae7c0 INFO: task kworker/0:176:4919 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:722 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb309fb0 to 0xeb309ff8) r4:855a88c0 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:4924 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:853eb000 r4:853eb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853eb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853eb000 r8:855b212c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4926 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:84768000 r4:84768000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:854c738c r4:85544d00 Exception stack(0xeb50dfb0 to 0xeb50dff8) r4:855ae8c0 INFO: task kworker/0:177:4926 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb733000 r10:61c88647 r9:84768c00 r8:85544e2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a9c1c0 Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:724 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:84769800 r4:84769800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84769800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb51dfb0 to 0xeb51dff8) r4:855a8e80 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:725 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:8476b000 r4:8476b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c7f8c r4:854c7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c7f8c r4:855b2280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:855b22ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2280 r8:8027ed34 r7:eb51de60 r6:85544f80 r5:8476b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa080 INFO: task kworker/1:725:4932 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:726 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb145000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bad38c r4:84bad000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bad38c r4:855b2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476c800 r8:855b232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2300 r8:8027ed34 r7:eb51de60 r6:855b5000 r5:8476c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa3c0 INFO: task kworker/1:726:4935 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:4936 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:8476bc00 r4:8476bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb535fb0 to 0xeb535ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdff95d20 to 0xdff95d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:8476a400 r4:8476a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bacb8c r4:84bac800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bacb8c r4:855b2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:855b242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2400 r8:8027ed34 r7:eb531e60 r6:855b5100 r5:8476a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa400 INFO: task kworker/1:728:4938 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:729 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa680 r10:61c88647 r9:8476ec00 r8:855b24ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa4c0 INFO: task kworker/1:729:4940 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bad78c r4:84bad400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bad78c r4:855b5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:855b522c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b5200 r8:8027ed34 r7:eb511e60 r6:855b5280 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ae2c0 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 r5:8495d38c r4:8495d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:4943 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84758c00 r4:84758c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84758c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aab00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa600 INFO: task kworker/1:730:4943 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84759800 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84759800 r8:855b25ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2580 r8:8027ed34 r7:eb551e60 r6:855b5380 r5:84759800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aaa40 INFO: task kworker/1:731:4946 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:4948 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:4948 tgid:4948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:8475a400 r5:8475a400 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aac00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84badf8c r4:84badc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84badf8c r4:855b2600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475a400 r8:855b262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2600 r8:8027ed34 r7:eb521e60 r6:855b5400 r5:8475a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aac80 INFO: task kworker/1:732:4948 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:82abf1e4 r4:00000000 r5:8495d38c r4:8495d000 r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 r5:84bae78c r4:84bae400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bae78c r4:855b2680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ec800 r8:855b26ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2680 r8:8027ed34 r7:eb521e60 r6:855b2700 r5:853ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aac80 INFO: task kworker/1:733:4951 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:4953 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853ed400 r4:853ed400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ed400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84baef8c r4:855b2780 Exception stack(0xeb519fb0 to 0xeb519ff8) r4:855aac80 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:8495d38c r4:8495d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84baeb8c r4:84bae800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84baeb8c r4:855b2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:855b28ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2880 r8:8027ed34 r7:eb519e60 r6:855b2900 r5:853eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aae00 INFO: task kworker/1:735:4955 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:4957 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:8475c800 r4:8475c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855b2980 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:4958 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8475d400 r4:8475d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc100 r5:00001000 r4:eb2af000 r10:61c88647 r9:8475d400 r8:855b2a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84baf78c r4:855b2a80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc140 INFO: task kworker/1:738:4960 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8475bc00 r4:8475bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8475bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:84b4678c r4:84b46400 r4:855b5600 Exception stack(0xeb581fb0 to 0xeb581ff8) r4:855b8340 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:84758000 r4:84758000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84758000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84758000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bafb8c r4:84baf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855b2b00 r8:8027ed34 r7:eb56de60 r6:855b5700 r5:84758000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc240 INFO: task kworker/1:739:4964 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84baff8c r4:84bafc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84baff8c r4:855b2b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475b000 r8:855b2bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2b80 r8:8027ed34 r7:eb56de60 r6:855b5780 r5:8475b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc240 INFO: task kworker/1:740:4965 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4638c r4:84b46000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4638c r4:855b2c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475e000 r8:855b2c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2c00 r8:8027ed34 r7:eb56de60 r6:855b5800 r5:8475e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc680 INFO: task kworker/1:741:4967 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:4969 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85600c00 r4:85600c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85600c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85600c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4478c r4:84b44400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4478c r4:855b2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85600c00 r8:855b2cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2c80 r8:8027ed34 r7:eb595e60 r6:855b5880 r5:85600c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc640 INFO: task kworker/1:742:4969 is blocked on a mutex likely owned by task kworker/0:78:3501. [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dff95dc0 r4:00000000 r5:8495d38c r4:8495d000 r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc740 INFO: task kworker/1:743:4971 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:744 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bca80 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:4976 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:85601800 r4:85601800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85601800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bcbc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85601800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4578c r4:84b45400 r7:ddde2d40 r6:83018200 r5:84b4578c r4:855b2e00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:85603000 r4:85603000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85603000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bcd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85603000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b45b8c r4:84b45800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b45b8c r4:855b2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85603000 r8:855b2eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2e80 r8:8027ed34 r7:eb595e60 r6:855b5a80 r5:85603000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bcc00 INFO: task kworker/1:746:4978 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xdff95d20 to 0xdff95d68) r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aeb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b45f8c r4:84b45c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b45f8c r4:855b2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ee000 r8:855b2f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2f00 r8:8027ed34 r7:eb595e60 r6:855b2f80 r5:853ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bccc0 INFO: task kworker/1:747:4980 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:853ea400 r4:853ea400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ea400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d55c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b46f8c r4:84b46c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b46f8c r4:855d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:855d702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7000 r8:8027ed34 r7:eb595e60 r6:855d7080 r5:853ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:749:4984 blocked for more than 477 seconds. r4:853ebc00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7100 r8:8027ed34 r7:eb4a1e60 r6:855d7180 r5:853ebc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4985 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85603c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eb489000 r4:855b5b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b5b00 r8:8027ed34 r7:eb511e60 r6:855b5b80 r5:85603c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855b8200 INFO: task kworker/0:181:4985 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:750 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5480 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855d7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7280 r8:8027ed34 r7:eb4a1e60 r6:855b5c00 r5:85605400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5540 INFO: task kworker/1:750:4989 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:4991 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac838c r4:855d7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85606000 r8:855d732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7300 r8:8027ed34 r7:eb5ade60 r6:855b5c80 r5:85606000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d56c0 INFO: task kworker/1:751:4991 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:752 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7380 r8:8027ed34 r7:eb5b5e60 r6:855b5d00 r5:85604800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:4994 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d59c0 r7:ddde2d40 r6:83018200 r5:84b47b8c r4:855d7400 Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) r4:855d5780 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:4996 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:853e8c00 r4:853e8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b47f8c r4:84b47c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b47f8c r4:855d7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:855d74ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 task:kworker/1:755 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac8b8c r4:84ac8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac8b8c r4:855d7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:855d75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7580 r8:8027ed34 r7:eb5b5e60 r6:855d7600 r5:853e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5b80 INFO: task kworker/1:755:4999 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5001 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:85638c00 r4:85638c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85638c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5e00 r10:61c88647 r9:85638c00 r8:855d76ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 90000013 ffffffff r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:757:5003 blocked for more than 477 seconds. [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85638000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b87c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85638000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac8f8c r4:84ac8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac8f8c r4:855d7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85638000 r8:855d77ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7780 r8:8027ed34 r7:eb5c9e60 r6:855d7800 r5:85638000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5780 INFO: task kworker/1:757:5003 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5005 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5d1d84 r8:00000002 r7:60000013 r6:eb5d1d8c r5:8563b000 r4:8563b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6480 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) INFO: task kworker/1:758:5005 is blocked on a mutex likely owned by task kworker/0:78:3501. 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf60c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85639800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac938c r4:84ac9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac938c r4:855d7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:855d79ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7980 r8:8027ed34 r7:eb5d1e60 r6:855d7a00 r5:85639800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5280 INFO: task kworker/1:759:5006 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:760 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb067000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac978c r4:84ac9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac978c r4:855d7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563c800 r8:855d7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7a80 r8:8027ed34 r7:eb5d1e60 r6:855d7b00 r5:8563c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:761:5012 blocked for more than 477 seconds. r5:8563d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb167000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac9f8c r4:84ac9c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac9f8c r4:855d7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563d400 r8:855d7bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7b80 r8:8027ed34 r7:eb5d1e60 r6:855d7c00 r5:8563d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:761:5012 is blocked on a mutex likely owned by task kworker/0:78:3501. r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:762:5013 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:854d1800 r4:854d1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb177000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aca38c r4:84aca000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aca38c r4:855d7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d1800 r8:855d7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7c80 r8:8027ed34 r7:eb5dde60 r6:855b5e00 r5:854d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf65c0 INFO: task kworker/1:762:5013 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:763:5015 blocked for more than 477 seconds. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aca78c r4:84aca400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aca78c r4:855d7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3000 r8:855d7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7d00 r8:8027ed34 r7:eb5e1e60 r6:855b5e80 r5:854d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf6700 INFO: task kworker/1:763:5015 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:764 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:855d7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d4800 r8:855d7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7d80 r8:8027ed34 r7:eb5e9e60 r6:855b5f00 r5:854d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf67c0 INFO: task kworker/1:764:5017 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:dff95dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:765 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf67c0 INFO: task kworker/1:765:5018 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5020 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:8563e000 r4:8563e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:855d7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563e000 r8:855d7eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:855d7e80 r8:8027ed34 r7:eb5f1e60 r6:855d7f00 r5:8563e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5023 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5e5d84 r8:00000002 r7:60000113 r6:eb5e5d8c r5:8563bc00 r4:8563bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7f80 r8:8027ed34 r7:eb5f1e60 r6:855d7200 r5:8563bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5025 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:854d2400 r4:854d2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb345000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acbb8c r4:84acb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acbb8c r4:84bdc000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d2400 r8:84bdc02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc000 r8:8027ed34 r7:eb5e5e60 r6:84bce000 r5:854d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdc080 Exception stack(0xeb605fb0 to 0xeb605ff8) r4:84bd6080 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5029 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:854d6000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdc100 r8:8027ed34 r7:eb605e60 r6:84bce100 r5:854d6000 Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6080 INFO: task kworker/1:770:5029 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5031 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:854d3c00 r4:854d3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:855e038c r4:84bdc180 Exception stack(0xeb60dfb0 to 0xeb60dff8) r4:84bd6100 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5033 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854d0000 r4:854d0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6580 r9:83018205 r8:854d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r10:61c88647 r9:854d0000 r8:84bdc22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5034 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:854d0c00 r4:854d0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:774 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:8476e000 r4:8476e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e138c r4:855e1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e138c r4:84bdc300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:84bdc32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc300 r8:8027ed34 r7:eb611e60 r6:84bce300 r5:8476e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd64c0 INFO: task kworker/1:774:5037 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:775 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdc380 r8:8027ed34 r7:eb619e60 r6:84bce380 r5:847d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6980 INFO: task kworker/1:775:5039 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5041 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:847da400 r4:847da400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847da400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847da400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e438c r4:855e4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e438c r4:84bdc400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847da400 r8:84bdc42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc400 r8:8027ed34 r7:eb621e60 r6:84bce400 r5:847da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6800 INFO: task kworker/1:776:5041 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5042 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:847d8000 r4:847d8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc480 r8:8027ed34 r7:eb629e60 r6:84bce480 r5:847d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6800 INFO: task kworker/1:777:5042 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:847d9800 r4:847d9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e1f8c r4:855e1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e1f8c r4:84bdc500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:847db000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847db000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42a000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e238c r4:855e2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e238c r4:84bdc580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847db000 r8:84bdc5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc580 r8:8027ed34 r7:eb629e60 r6:84bce580 r5:847db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6b40 INFO: task kworker/1:779:5046 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5048 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:847dbc00 r4:847dbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6d80 r5:855e278c r4:855e2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bd6f00 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5050 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:847dc800 r4:847dc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e2b8c r4:855e2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e2b8c r4:84bdc680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dc800 r8:84bdc6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc680 r8:8027ed34 r7:eb629e60 r6:84bce680 r5:847dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6d00 INFO: task kworker/1:781:5050 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e2f8c r4:855e2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e2f8c r4:84bdc700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dd400 r8:84bdc72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc700 r8:8027ed34 r7:eb629e60 r6:84bce700 r5:847dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850c93c0 INFO: task kworker/1:782:5052 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:783 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855e338c r4:855e3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e338c r4:84bdc780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847de000 r8:84bdc7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc780 r8:8027ed34 r7:eb629e60 r6:84bce780 r5:847de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6600 INFO: task kworker/1:783:5054 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5056 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85610c00 r4:85610c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91000 r5:00001000 r4:dfb53000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5058 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:8563a400 r4:8563a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563a400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5062 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb661d84 r8:00000002 r7:60000113 r6:eb661d8c r5:85640000 r4:85640000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85640000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdc980 Exception stack(0xeb661fb0 to 0xeb661ff8) r4:84b91300 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5064 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85612400 r4:85612400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85612400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e478c r4:855e4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e478c r4:84bdca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85612400 r8:84bdcaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdca80 r8:8027ed34 r7:eb629e60 r6:84bce880 r5:85612400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91540 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdcb00 r8:8027ed34 r7:eb665e60 r6:84bce900 r5:85611800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:789 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4b8c r4:855e4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e4b8c r4:84bdcb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:84bdcbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcb80 r8:8027ed34 r7:eb66de60 r6:84bce980 r5:85613c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b918c0 INFO: task kworker/1:789:5067 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5069 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:85613000 r4:85613000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85613000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4f8c r4:855e4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e4f8c r4:84bdcc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:84bdcc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcc00 r8:8027ed34 r7:eb66de60 r6:84bcea00 r5:85613000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91700 INFO: task kworker/1:790:5069 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5072 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb681d84 r8:00000002 r7:60000013 r6:eb681d8c r5:85614800 r4:85614800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85614800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e538c r4:855e5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e538c r4:84bdcc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85614800 r8:84bdccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcc80 r8:8027ed34 r7:eb66de60 r6:84bcea80 r5:85614800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91b00 INFO: task kworker/1:791:5072 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5073 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb685d84 r8:00000002 r7:60000113 r6:eb685d8c r5:85616000 r4:85616000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85616000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85616000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e578c r4:855e5400 r4:84bdcd00 Exception stack(0xeb685fb0 to 0xeb685ff8) r4:84b91a40 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5075 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85616c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae87000 r7:ddde2d40 r6:83018200 r5:855e5b8c r4:84bdcd80 Exception stack(0xeb689fb0 to 0xeb689ff8) r4:84b91c00 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5077 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:85610000 r4:85610000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e5f8c r4:855e5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e5f8c r4:84bdce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:84bdce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdce00 r8:8027ed34 r7:eb66de60 r6:84bcec00 r5:85610000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91d00 INFO: task kworker/1:794:5077 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5080 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85615400 r4:85615400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85615400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e638c r4:855e6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e638c r4:84bdce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:84bdceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdce80 r8:8027ed34 r7:eb66de60 r6:84bcec80 r5:85615400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91f00 INFO: task kworker/1:795:5080 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5081 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:853e1800 r4:853e1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e678c r4:855e6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e678c r4:84bdcf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e1800 r8:84bdcf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcf00 r8:8027ed34 r7:eb66de60 r6:84bced00 r5:853e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5083 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:85618c00 r4:85618c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85618c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85618c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb159000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e6b8c r4:855e6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e6b8c r4:84bdcf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618c00 r8:84bdcfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcf80 r8:8027ed34 r7:eb66de60 r6:84bced80 r5:85618c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be12c0 INFO: task kworker/1:797:5083 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5086 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85618000 r4:85618000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85618000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be14c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85618000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb287000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e778c r4:855e7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e778c r4:84bcb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618000 r8:84bcb02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb000 r8:8027ed34 r7:eb66de60 r6:84bcee00 r5:85618000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be1140 INFO: task kworker/1:798:5086 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5088 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:85640c00 r4:85640c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85640c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e738c r4:855e7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e738c r4:84bcb080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85640c00 r8:84bcb0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcb080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb080 r8:8027ed34 r7:eb6b5e60 r6:84bcb100 r5:85640c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be1680 INFO: task kworker/1:799:5088 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:85642400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)